Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
188aa72edf46dd2bf87f6bb9a307019d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
188aa72edf46dd2bf87f6bb9a307019d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
188aa72edf46dd2bf87f6bb9a307019d_JaffaCakes118.html
-
Size
10KB
-
MD5
188aa72edf46dd2bf87f6bb9a307019d
-
SHA1
543f93f33a1bd40ce46bd89de2e6b73919d64f2e
-
SHA256
7906887939dfac4195b8551d11517e4d1a09527f227a5a3406c7e918565edebc
-
SHA512
50f38e2746f205fb601db60f101c45984b7275a8c9b5619b848e2b016cb78c64600e880a554531b27e717f878a84c05ef2c27de2e6111611d7d30ec772fc6d57
-
SSDEEP
96:uzVs+ux7WHLLY1k9o84d12ef7CSTUOGT/kQ9p/aQnfIYPlWNmWNCPBlVHcEZ7rur:csz7WHAYS/T2iQfpPlWkW+BPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000096bde7abd25560ac1e1dd0406967fc83eff11f8303c0003a5b3343162208b90b000000000e800000000200002000000032125e79fe0e303940164a1fb0f758654d6d0768c496f4669c1c4633b2d91f9e20000000e56ca1b580923733307bb6baa75ca44ddb9a2ec803cdaf409e553147deb885cf40000000cb7d51e5cc6332acecdefbe22427df0546e9115f8298c66e3de9787d839b7a3eca46bd10f7ec01420557e20c2b0b56491f0330dd2e8ca9a2a208234475777981 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{457226C1-34FA-11EF-A0E1-D2ACEE0A983D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425705366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0db721a07c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 352 iexplore.exe 352 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 352 wrote to memory of 2432 352 iexplore.exe 28 PID 352 wrote to memory of 2432 352 iexplore.exe 28 PID 352 wrote to memory of 2432 352 iexplore.exe 28 PID 352 wrote to memory of 2432 352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\188aa72edf46dd2bf87f6bb9a307019d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970b1d4bec33b4c3055fa0d89a3c5f0a
SHA19b903e0e1afcb9defff22b5ea0b50f8a8c6d495c
SHA256d845ced399062fd2dad178f026409b77751097c049994ef0c3b2db0fc5d32eb6
SHA512fbaeeff1f0b2c41aa4f73ea93d02834b3328f23ec4754b0ae0e441cb097adb9fab02d2277c2ab8d4be7e699f22288c4c97a8c782c1bf615f5bcecacac1c00fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098a447ddcfb3c61b64189ae049d6ead
SHA16d8ae849c07a1b4e7786a30887010949c13d0f55
SHA256da5ee2c8e388dd128c19a6e1a21ef7b5ffb45f29cd8ea8f99dbfa083c44c9b85
SHA512f9d0a4b2bb66c8e3765f9bb4a394e4b337fa81e07b7b91ed0e7f4ab80be685ea6488aa2d9ac2c2a22514d0a58e46402921e8d457228b463920e9bd49bb505811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa201247c3a171d3f01ff781588c1c4
SHA17f368d27e667a2692b5fb4b21c93ce0ce8191ebe
SHA256859ad7f4caa1e37df314ff0cb514a2d614ec89e4a9e6c056592976e4b7ffbfe2
SHA512248f8294e025404fb862673fef041f84aa46d3d958ff7f49b3272d526518ff8b042b0f2084e86eaa10e41ede5f2caa3cfe4cbff18e0e0c641fff67bce21543cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f8152374c5811fb2f8e71081588805
SHA1f634a8508f55f1fb439158365eed9abbcca605e0
SHA2569efcd179bc13509efcd977d6fae9a347374fe5b7e9db630cac40834db241db45
SHA512bdcccc5c7475a7094ffbce90944a924aea7c8d1dc7993925ae4093e70235ce3e8a531a931750ebede2b6d02181add5b88e688d45b63c1e7f0549979b86d10e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ab461d8a073f96e209bb7fa9f4ae8c
SHA1bcce759a09472b6c1e2fcbca6845143953edd837
SHA256b48d648d37424f03589247bf596eabc233db8b2e75c43ee5abf4060227c2082b
SHA512bef0e365a0135f9eebf63a30fe7753e099bda151c132ec5a6da0c4e643bec2094a925488e442119ccd2f5a703473268f0c5a7fdef6b6b1ea3a18d26cd904b8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7158084c36e3f20de680d9da92ffe16
SHA14c92962ce824383eec2d7f10b4f23a1902639892
SHA25650daccc40b9a170260167ea11046f172b906ca20b963f908b387758954eb5613
SHA512c29a3ee1815161bcfa677af28657bc3631b02cb17bde9bf5af6ebe4a221d1e18c214f449d7bac01a6c8a575ec6af3cd0b16ac137b3fe0db414cf66be5ff1b6a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f047ee077fc9a38bbda2ceef0ca53e6d
SHA1075eaf52b1b21115924ec8409e48022195bb1037
SHA256fe76a2a10a5c13c184d2b77af9b4fc440a2ff1030c02c366c3749e7e999c5851
SHA5127d0b7e1d5ac04f8f39679a79d3da03b404100134a19e56ed6d07ec41905b504cd5c8f7d9964ccea90c4968aa32c79318eec9fe8d1bca1e02b5a2cea572131870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bbbc899979da02d9dbd894c2e11902
SHA11d50f4758d9d7ba8f86a131e788d020c3d474f75
SHA256ca39d9190b371a7477a01591c6949716d145fc54f7d3d578f1eb695469eb7e20
SHA512b700df024119b22ee3da66fb886db6af422201bdddaf2cd157033b8be68ba2d6787f3f12d9a3fe0a657dcbd8528242af5b1b6237910ac00076e6c1652bafccbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ea9035ee0c132a2ca95bb3b89031ab
SHA16ead68e6d35bca66e1cb763bf84a80740af00095
SHA25639bcf402f967dd9aa354c1411b17274aadb35f732e3dec5fc568427b8584f14c
SHA5128e78cfa2f64156a8081fcbe5ef367d0c3997257a86080dd1c76c57d93301d82f237e5b7384c2c5bd9a61a42c5c2c9c7fd2587d589ba55720270ca6e5721bdbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78f5fbdeb13a4ab5cf22d7f459bea49
SHA18efc7394e7bc02136bb440b2f626db3495d8baae
SHA2566f96b31c1866399d5be27a5eeb34efe57cd4ff7d878c8630bcead914d3c18129
SHA512385c5a628596297a6d98c5157d092f8ce2ca9dc86ac6da13bbeca7b3c437d196cb46a20793890692b860e80f98b39811c576caf0c215d38cde42176ab415058d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59175e9c887d22072b10dd6f3eb34329d
SHA13556927db2f1a448f52bcda685a107afbbeec48d
SHA2566e44bb87941f70d32ebe0ec950a0d22861bded65902149e76cf3813aec043344
SHA512df72758e7b1b61718521f10560c7ac91d756b4b284cc17ed6055549de188723ce4b60acf72203a08d5e6c09efb71c4485e4705ab08b0c145e09fcb4fecf3154e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0f0b3f7888986ff60ce248c733ffe3
SHA1bd2086d778f50b7bee48187835f6e8ee4cfe1869
SHA25669ed060353ba35fd97d2376d60ba246a6bb5bcc08a791dd60fa3f97bfe573cfc
SHA5121d420dd3e5ccc4c72a1caf08f912c5eab6c55b732968532e510db3358233208251bb481f53a9c836f2284c24082475f46de03515c2f3cdf037d5032491ef9661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f53fcf350352bdd8620f0aec4e7fde3
SHA1762b4090bd228045df3c68cecb4632d8129ac909
SHA256108ab6d0b98cefb0b9bccd4f31a997dcabe750d3aa975bd1abbe1658ce532050
SHA512ad013f551490e955922738c704554dc1a9aa0264b881109057a9ea389901f191ed1c3c64d2a49cf975785d0456160528a849eff3ce842aba4e261b8a5de3ff59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55449ff4a1fd2be9108b88bc207ddf5a3
SHA19719131e6a2650db8c679a416079aa3f73bd22ad
SHA25629b24d497f2579d0cd9b65e2bb93d5927b6ef62c2feb7e2ea2227126756ba0df
SHA512bdf2480ddb58e2534872b4e95e06d32003173cd8c79cd4ea614c9298bfe48abdf8ad963732b04a187affe490e95a9f7d32244b6bfa04d8d4a9f191745ee7147f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910832b5294b9f07fcc781eb0e91db3a
SHA156b3d3bc534bef8cdd6efbfdb7735ecd30130fbe
SHA256c9425d0bff395fd7942571098afe72af8126f5526e9e7299102621c8b2a36d58
SHA5128f22e43be150b4aa3e61b99dcd6201355cccddcc71c4cbe3957d9f4ad294acc6880c9fcbb759f7e43ffa1513cf35fd7f81a3f456e5c69438aa26b3f2b375b9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54448c95273de9b687be25f1e001effab
SHA16a3cc44d68f5363335ed36c7da06bea4bda63616
SHA256d909300c37699c479543306363c4767516505de1b94062366b063adfaa6b7d82
SHA512167b45f8826a497d1b43857408362f4d5df19cdde275e07aa1e1dffb978b45a1e4faf0fd3d4030ee0c2333ca98a37ab5aa14ab913621a7fbd3af110798d48541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584775c0008107d315cc651648dcccf9c
SHA162ef8540c08b4976f27e6e6c843f0dbe36f7450e
SHA256d2a1ea4503fb9e1824cec5d44e50edf32c80b09dac92d6a2b0c44eea4fb36743
SHA512b42b247d5a048316a7f68621fb6e9dadc211d3bceebbca1d651c8ba0072ab1a916a1fc76ffdee6a61b2fc69e6e9a4527df3316cc46ee4e49385cce188f7c3814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6ec40038ad1ed7e547e121184aaf95
SHA1b37ddb5c67a166525399a9256584c283b457e491
SHA256b7f522b86e8fd037707cb4d23848a42b0417f5cf214047e256f4a0ac2d88170a
SHA51288b76ccb29a7471c06c3b1c8e1d18f3f0bd77707c24dcefd2df63cc168d141c6ed02c8a48375236e2bc9479e670edc77928aa8c9671d1be79e870f1c8739b63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940578c4aec32c7d408c2983b173c29a
SHA138ea0e1ce68cce155f90dd780cb6e9600aaa75a9
SHA256ccec07adb1a288e4c53d1a50cbcaeaf3a2c3bf2aeaa6486ef4df821a0bfa9976
SHA512ffccd2d080625767337641b3f893b3eabb7b01948d566be12894761e8db7f665135f1f7e65e165cf502551b1e2860d38532344c50b71e92aac31269ba08da69f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b