Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
68d4627060775c20b37f115c722cf4f3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68d4627060775c20b37f115c722cf4f3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68d4627060775c20b37f115c722cf4f3_JaffaCakes118.html
-
Size
6KB
-
MD5
68d4627060775c20b37f115c722cf4f3
-
SHA1
dde65929d964b6a242c0ec98152b87ea57d18c09
-
SHA256
620bcc6d825a49e58784efae3bd1eb94d9c4bd21216c37f13fb73ea252754167
-
SHA512
c3f91e6d52d8b4722e17ef3ba4f42d75348723c0dd381dbe8a492647e7896cb6b1ed994ffd79b4cc440cfe3ae257d6868a85399fa5e3417e94d5c9d0b1082cf9
-
SSDEEP
192:lTFOFkF/3cFOFkFGFqCX3onl7nsMGIWeLEDEAEJEkEV:VFOFkF/sFOFkFGFDX4l4FOEHmr2
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54B72691-1889-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e009af2996acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578226" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b28233603225784cbd39a69327055d45000000000200000000001066000000010000200000004cc51b3f7058c905371b65dc455d596b3a621ff6fb40eef71c39880a688a459f000000000e80000000020000200000001597d9444a1c896b60aa7f961f1d2aec46eff45b1e9709e9a55ae337958b3eed20000000377952de0dc5e35456c17d08bc2203645a5aa80c75e10db5813b8cbeb0bc29484000000076041878603543734eb4ab91b37e76400b3ebaa5d5a82d4bf7c23ef847391e553eb81057c1018d2f5a99ddff8d20e82e48f7e3f4f30144320b2a132547426be5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1400 iexplore.exe 1400 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1400 wrote to memory of 2616 1400 iexplore.exe IEXPLORE.EXE PID 1400 wrote to memory of 2616 1400 iexplore.exe IEXPLORE.EXE PID 1400 wrote to memory of 2616 1400 iexplore.exe IEXPLORE.EXE PID 1400 wrote to memory of 2616 1400 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d4627060775c20b37f115c722cf4f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51865b158a6cf82374f446a2ebdbb6a04
SHA16e46edf83a5e601f11bdd700a64c7848b4cf7f7e
SHA25652604d5afa30ab29215dcb8c9f25a97bcdba355a6a51cea8cde1bbbcd32620df
SHA5121d216c72e5a355dfb90671125b8f333af662115440bb721fb36f1359cca72b4dc5838613e583b2175246d69dc926890f4ba7965720faaa6fbef9f3ef1dc2f84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5100d131ce04da4667f75c31dd5e0b4fc
SHA1aa322744beac865d8b05812ae3f132e1bd3b32a3
SHA2565d0b99e2fe638d359feb7ea7ccc9e87745a8a52c18dfb1cef56c9b05a90e0a49
SHA5126992732e046c614f2d8126239059357e5aab9915d26ab0bc5978ae72461cbb0c4679ba3fe79df4ed2bdcdbd96e7b511c0a6b265d7d2621ec97727ec1340ecfb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c24dbdb3fa81319022f0ad073ab2201
SHA13c2de8bee40382b380309fa3588e8eba0645b3f2
SHA25665c496fba8ea4c792ea1ceaf17e1e2d65aa14a2d792935c52da6bcbb828d7957
SHA512673c28a1e341bec35c40d3913c5e30d13a158947ddd3242e88502f2c2fed4b13c29c87f647e0b325c043a712c990c4df457a1c3340523793471eefb7a8fa7158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5989aef9fb85904cb5a632e47f11fd3ae
SHA1f29b914a04e30cec4f6f62037cb99642bd443598
SHA256e3eb65147755414d0288e700107a6740f270f48b64dacce34285513e378a6317
SHA512375488717b6020d421940e841a15a36ffa3ee6b84bc95a7cce069af79aa7a55a5e649e1ba84675144fb15db99c0eefcd812b1f91c5e901d79df9222149007ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea0e6d0c3eba45b89ea7fb7138783c1
SHA1603c33770f9e5fedad01121802a1d81135f87047
SHA256958381abeb0ec2fa69f2577f4b19cdfccc449818871d765efd1f0ecd464a1cb7
SHA5120d8cffb8756bff6a28a65ddfb01bab488be3c30c1c19d40583f2f9da080e5f57566bfc05f4e80d5ddfe13ef67e056927e42448ea17f201f943caca5bf64fe093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb1c1993c39393c02b6642e3298aff4
SHA1147cd821bb6744d6e5e728ebea3ba78c1595977f
SHA256e7bb924912c84b261435d2a556c7c1ecba6fde200c6178477019d8b0194b3c6c
SHA512d058320ca398b3c35ae641ec931207d234beaf30b0999929184eb8d9693e9eab6a9497e2df2f12b3dc689b62d42e0b04ef4587545a602515be178b0f560ac6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454ea84f07034892943c17aedc016fc0
SHA1dd7af3df578fdef5be2ea510e167117b10245953
SHA256558c558abc8ad93f9086a2ff7d8f850eca464d41d63eb3cea3e525389c56c970
SHA512396fb8ff5b868e7f2495a8d3299b48f72ebf757ce73ee7183494f81cac7bb0436c44f618a238e1be43001f093e03c16f80e703962612315c0d6f75ff3f207de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5129999e06b9e3f8206d076a93a0ae6ae
SHA1d38f57c4aecf3f467ef40f7729625a75a26f553a
SHA2567a5bfcec4d05dcfa32308f08755f3018c7cd9e89d5fe9830338eca460677c598
SHA512c55c80682ea47478dc2450ecc697eaa1358601abbf081dbf5004eeb90526a526476f69a0eb958e45c50690f7842d11ab835196ea56261c29f4d68627e2c0b8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c79eb5129ac85d634b57b6c7e5ab267c
SHA1e56ecc1d94a80c7722dcae5154d6a2376a5941b4
SHA256f547041eab875af5f99793dbd3c882e50a682751ed24bd77e62d040f78edd144
SHA512970dcfc2598eaf69fa2c1b3fefdb64d990504bf835c780522d0b0b8a4571d7570780087a66435ba065b9cd8ab613a52f925d2aa00df97d05cb49317f7c1fe36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58527ace978ebc0e8bc7c4d396fa41ed5
SHA157ff349b46affce87c3f9c814276d1046000e2eb
SHA2569f9ae0b88118de93e3d6255bad24ad82af44ddc221beabc750b8bf08d2a4cef0
SHA5122351f80afe11ad4c19fc7e19f005fe83febaa4ccdb513c296be7008ae9fdc53dc9805a40e3536786e2592f802a26649e81bf6fbcfeb04c6a151bf49dada5ed6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573292865ab13b886c897c0fb5bd3405b
SHA19fa6997cc896be7d71c5fbe26ab00ea84634e86f
SHA256b2794a937cb2977caf75a4f2bf251b3cd3016231f8d921f56b2d1ba99eb78cdb
SHA512d49ae22af80693102c74d76ec74545a18fcbda602cdecac80d912f0816b3c5c2e6469a70fd856618ce8d6e39833748a7f4732eee17b4030bf68262dfffcb411b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503614b49d39608cc9f6fa734d024c0b0
SHA115526df9a7dfc44e1f710d3146c399ade24628ec
SHA25680a4a79be4e87c0971326331037b3a42b86dd0614f41e013b4ab9d5b613ea873
SHA51267d72da69a23c4bfc38851b95694a164a1d7865a25b5cadab3b03835096a70e3a0f7c009d3b88f54be8d33e2cfeef0834addc62ba296b0a82a4f2e04c30d25ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b168c46af70f2f590c9bfc2fb37ba38
SHA1ba0349544922a74b5852fe2aa652f86b5780be4a
SHA256537a8904d63641b0451ba51f30b0990f850742a4c2101c8dbca360bef260edba
SHA5126870cc80e1ef866dad98e09d4a8fe89cf89da5ebee3c1b1dea46d73711ed35daeed543ef10868bbc02ad813911f1a4b43e0d92cb28e49a30091ef885773729f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5977b21bff49c29a012694e30470e115a
SHA1a0cb5b65ce36c140f1dee58f9234d5774888caa4
SHA256df01ba3b4c795ae8c311fba00791ac41676a62693e7d1bbe58ab2266ccece8d5
SHA512c1ebd9b566d06660fcd6248c7a048eef5655c3ec1163e474d9a33c7af7fedeef3c307699569ea42c1084f8c480a164a831190503ab58d96eacce461edebaf2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa22bf7ddf2e9843eb735a3673688ae8
SHA15efb7372c2f0e9b92d8f9ff68755048deb1192d2
SHA256730144f48596803e9c17127735181e3c9b4bcdc87452847457fbe624e86f6f64
SHA5124ea46eb6218e0a9c53768fb685f9f89bba290b9c2bad136776bb9574c45547ad29917f02e3f7eb616adf9d711d176907b80c430f754b2f6e5bbe1b0d2fa03157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589054bc2562649d1e303f6f717fd4576
SHA116e702cd513b64cd4462bda109e87905869c08c0
SHA25625dcf2c58bdda34117cf291019e3f2fb4036f14d71ed7fc490884cb4aee3f906
SHA512a4ba1d7174fb2416e0daf61c67633b1d1cd771a91a0b0ede2ea2fbc0a3eaf30d679d6b71d787f88d5e419cbe8c4765597c759501ae6c152b9c03a82487a9d5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599336c04f1a0eb879aeda36e42e37a6c
SHA15844141ad55a342878f0f040082bcfab9cb4017f
SHA2566e0b3063e72629943bbc773aaa8426294f6b87860655377a47eafa2e21c19fa6
SHA512ee6c33c35d60dc9a41b04c7f77b9e5a6027ae12888d1229df1a8ef14c72338a642e207806b037aef739faae142588afa0e6593da6804cf049674acb01596ae64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd66733acc7461f625932b166df20e80
SHA1d6b9aad07309c32298fc0ced055037b0d24bc622
SHA2567d7b906959207f3d1ea11e8f51c7fd5d9de0d6baaa63231e367ce9c0e23a5de9
SHA51284f7025c7564f67bf76364b4b50ddde4da6a077a4b08ed1f5e851e66a566ed15e14010478499d7108af47e199b070b3f59a8adf9f3bd0bb43caba68c6a931f8d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a