Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
68cfea0e0967284de00a20e895ae73f2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68cfea0e0967284de00a20e895ae73f2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68cfea0e0967284de00a20e895ae73f2_JaffaCakes118.html
-
Size
13KB
-
MD5
68cfea0e0967284de00a20e895ae73f2
-
SHA1
9abdbd999bb5c2fb01edc9664acd6086af514fc2
-
SHA256
e9c1a3b3e44510fb709f4553f28a804164754fad45f6b1fed71567b71c5a924f
-
SHA512
598c0a68511e86febde5f905974fbf737797984ebeddf8d91edd23a5df87236832097a558c93679334d714c24b62edab130e620f02c065a76d03eb3ecbf71959
-
SSDEEP
384:CyiA6WTYTQFAi7uuvLIMMPKJQT+nrQJQvwKUoEF:CyiA6/QFAi7uELIMXJQTMQJQ4KUjF
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0bdc21f91b73940b12f039b1c8b984700000000020000000000106600000001000020000000e800d942da3ceab533c445321f35cf797abb61af76999a69ad991fea3cb7400c000000000e80000000020000200000009e1699b6da8d6792ab93b9b3ec07bac140abda538ba88ff7922c3d46f34442299000000000b820ac85673f6c498d71afcbf182c4dca9c5c77435c7930ae08e76c72c4a9f4e26ca6b3bac91d1e9e8b89a07470cbd5eb0f6de5f99c1c75b02b74e170767f0eb36f99efee815b0fbf08a70bf27efdf5b76791e27b77e949666e4937de096a1e32fe0262324d41f44c578f856dcc03d34e72f101d0f21646a7146ddd256b18268ed09a07c480ad8d2f801aaf531896b400000009ee4d8a1edf10410b4e07f13e13a0189b17d521ca6b730927243ebeb30b2a178683a8aa67b1b3abd15f6135070fd5dd4d1b941a69a5532bcad809d3aab677ce9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D9F3A41-1888-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0bdc21f91b73940b12f039b1c8b9847000000000200000000001066000000010000200000002fb86f09a26ffefe9fa6ca52c6aafebc8d8cc00cf00951043ec8106577b8814a000000000e8000000002000020000000b1b172e4aa261432837918b2367bc910d770d0b0ffed0eba4176c2428d68288e20000000c96d666e7cfa16eb34343bb7d30d758e72ea45cc7e3758d233c6cc862a51bb6a400000009634e5dd5f207cf848267a755db726ddbb7650bc7e07ab17bc2d3a3728f8f7d51810b81bd644d42a4d8552d4ef72d368183fc01fba3606e75e9b2844d1101461 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422577715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e2eef294acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2916 iexplore.exe 2916 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2916 wrote to memory of 1936 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 1936 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 1936 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 1936 2916 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68cfea0e0967284de00a20e895ae73f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58f80010d1d190b64eac0813c7fa6b1f6
SHA11771fe4645d6cc460adb0ebd1bb912f1c7517009
SHA256fced3d4da81d7080fa9dad0c71cee33fc90771380549223ce049bbe624072f07
SHA5128a65f9a7d279136d216d147dd051b24e843d87768c6f02df6a16e33bfdd2696ea079da83610d92bfc1786f7082a82e736d21ee8cc7184fcc06391037125163ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d87e4acaf69a25cb6b7de5e2fdc830
SHA1ebb56f0578bf56700ca66668f652ffe23fe47ad0
SHA2566200bbcbeca0d353ee535ac16891b163bca304f9157a9df689a41eb82cef0f29
SHA5123801415436edc6635dd5428bb744e4834d0f128cecfc481b1c7adcaaefea7120be65785fc005c0c2ed40f0148b3f560a0a36320dbc33c083a4266c289da80b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533eb948e183adeb928752de103f951c
SHA17a18595258a20117c080036d6076dc9bfce38071
SHA256cff2d40dff9e79e54e1b9211b9be0f9333620e39daea29f462c60594abd874ee
SHA51281d87916593c186b9e13fd93499c539b14843c441179ff9e8f31ff38537c8dc0162c8fde30d6ddd592972d86e209dda8cdf748b078e4130f57a5c88347661e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68dc452f58d6a8b42a1936f52b4155a
SHA169ea2f278d67143064073430c4436fff0f5f48f8
SHA256e87e5aa6ecac54ab6e3919d101b594a9b77be2029fc1e425b16fd552f149377e
SHA5123001485faefe84b1f59f10fcd438ff9e8c705a423314c7b36ec32970bc00d24a4afaddeda9c5fa1706958a03e304510c8015254a4e18eb6865b8f3e7938efeba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa75c28499ec0246e97fc721e320e6d
SHA1fee6c13fb736a85f94369e7934d9d8fd99f67029
SHA2569a34c53c6eca08a78d5e755956c77faca08e96b18ae78a5151c6de0d638a1802
SHA5125582946d6797b5373b0563027966a0e1c343c6ea17990a5e1d3f33d014fa4aafbe6280c6150fa3be38d502609a04166440894c3f244e82ef271d637ade013373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8d32d3ea209919ec8dadcdb8da2e273
SHA1265472e55e9571bf1d24586525c11a29cfce8a83
SHA256d2dd90fdfa1c116a8a970a7e545a858d25d9736e193c434ce4b25b268d7eafb6
SHA512759a5063442460593d16b77555bac5a886469b20c912e8ad2f98f8b271264834b694f4454a5a3d015193b83eb59252094f7cf4398cea36678bb80e15af580a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe5198698cdf76597e15d12cd9ec42b
SHA12e36ef6676f5b3d7daf8a20e89784f1c130c51ce
SHA2568ce3969d2ea1318f05268350ccba3f3e64ad34739fe15e446af60d0232d97eaa
SHA512d93445e46782cf487f5318e32a784ccf800cd0f097f3aa3f44b781db6c126a2774b1b5a1bb0ec54573d8790616b76fdeec64e9fddc1797aec94ee017b7f249b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53337ff48065fcf630a6b404b021da441
SHA18a76d7cef7c954f5f21e39211c43414814ba2ed6
SHA256b02b9d78d4c5ff701d9e6c3a32ebd246293158df2e22d4ab5476814b4df2b4ee
SHA512c0cf69e9ca01038bb907954e9a09387ec87181ce00aaa061f0ab602667bc6e582b789c30ba4d6fddd530c975a1fd58f994af651f96940c5de91af0c5375f624f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee14a8a399a9707356346d037e31b316
SHA1e19f829638049916eebe6f6e63af19dc09d2f5b5
SHA256da86a5c69623328e75e8d95d8dcb3b80a85b8de43158d0eba4a56efc15e82342
SHA512310d83e6edd7826cfdcb0bff07c058b2e3f44cd8092d169877752933bfbdd61e7e4e25c549d32fb54c7d7a6ae5a97a54e751a0abb77f7e324e0916047c26eb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54db63c3a1c97f4dde16dfe6a180c56e3
SHA1f6636916900078d2f5ac334639ee448dffbbf2e8
SHA2563ea9445d85e67eed76fd1618da66f914c4d314144c8e922f575a19cce91ff5eb
SHA512763f63f610a9c53967a10976ad0cd59672fa1d87889a7ddb9b748e9146c2261b071bf546224cfa3e91ec7c1f57a4f9e00bc2c4f5a78d53a77432813b81ee793e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7b108cbebf04a05ee121393119fcb9
SHA183fb3572a66de7aff9e02b8a2734bb4b64c2a695
SHA2567a053242050ef17e30c3e68f314d4998e1ee19ecf4d4394f1bb55867d9a5f43c
SHA5121398e69233e15a8ab95f6612fe5a08fc5fa26b749ed1dfda0e2c0bbe57b421144d81f2935fa5a78dfd11a6d41237a3c4c5a20ce1aa0d72dcae68ea196c1cc4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51958e6e71ba1969c508cadb0281e4246
SHA14bb552ac16c4d57ceac431a8299af9307448e7d4
SHA25640c686e1ef36c434a4226b3970563651f18a041a0558a9610d8775cafcf692ba
SHA5124ee447dd43e50084a7f9d3182d01ed3af7bcb74cd48e9834ad5346eb5e8f8c2ef3f7493049682edb0971a46683e19e64a910ec6fda021bea6184465b7914cd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8eba52a2ef63b549c43681e6f85c386
SHA1d72c8028e3a2c3ff7b54044739af59698de695b7
SHA25653f24443a90591b22b163924f07f3634b40e2d5fdc289458aeef3db28ebe6f7b
SHA5127e09c3278b91da9a4ec36b5e2ad495811af95dd10cd542b5d105a8bf640b6845eb6dca618cdb6311aa72d01fae4e98ed508f96e12a2252f3dd6946b6cb4a2529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d180d9b671a6a1ab0b887084ab84f63f
SHA1f9f41155ed30832dc4419f79360b955a4c221a49
SHA2564ee724faf26d845f80de13dd25d61165501f8d8729a64077a6facba15499d914
SHA51252853ac6c6ac947eca6e646ebb6eabe5269f591a868292fa9bb5e6f632eb812164fedd594194e934e7388c1a5bbb710eab89ca99536e8a602a59f6aad9ca0f5c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a