Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
68b1c7ba0b746d34ef7497e0ba12398c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68b1c7ba0b746d34ef7497e0ba12398c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68b1c7ba0b746d34ef7497e0ba12398c_JaffaCakes118.html
-
Size
67KB
-
MD5
68b1c7ba0b746d34ef7497e0ba12398c
-
SHA1
bbee6ea759de348ed4a5faf0c9fd7a7fe9dd11de
-
SHA256
2b34953b44e655c0ae770948425c80bb63d6006fec1ba17c6e6257dd52035d48
-
SHA512
3c1a900d5465d3bc3d784e7e82868790231a7b47ed6201fab8e0878ddd1c5745ba39bd306783903c34bf5725e9571861fe8bb343e340e6e1fa2bcdaa436d81d8
-
SSDEEP
768:JihgcMiR3sI2PDDnX0g6mmj8Qo1YoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JhgYQQVTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AB4BDF1-1882-11EF-9340-6EAD7206CC74} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000929fd894c8ecc940b4e0cf0a4ded14ed0000000002000000000010660000000100002000000040233a35f4f1435a58531381ab7bca3324223f58f41abb56d6e060674e4790d4000000000e80000000020000200000009a1ffad6b505c00963a50212e2cd734bf9c72339b72bf71640d3d6778448cdb82000000053f8fbda456a2af938fc8df6aedf1f3502c6757ef183b78ec48abdd6f010685d40000000a1190b02295f57659c500880ab200590718fc73ad84b184693de882cead1ebc79b2d486364e44e5a7669a6ad0112769a7fe4b26b85a7b1eebf724f36b8dcd7a7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575149" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b748ff8eacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1752 2924 iexplore.exe 28 PID 2924 wrote to memory of 1752 2924 iexplore.exe 28 PID 2924 wrote to memory of 1752 2924 iexplore.exe 28 PID 2924 wrote to memory of 1752 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b1c7ba0b746d34ef7497e0ba12398c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c81437f8c505fece09b7ba9a9be53b8
SHA1e48ce9410b6688e6175f65dd6c15ec9cd1a08a01
SHA256dead41299d6a71aa98418cfa2ae1a9621f4d263c027cca419c53477cb3fb7485
SHA51225fb8f4680282fb72f27e3b92f2ea0862e0528bcbad3e78a1e807af7f2848aa46d803742113f2a38b5c4c7f1c8cfba47a090885e0b5e2c2e01a15a685b6b2883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510bbff6ab7f7cdc145227fc6b8e67a8d
SHA1e354838177ceee0c76d97a0ef8f7ddd43936a4f0
SHA25688c923faa14b219d45b58c51d771fde88f47860af687555c9aa7901a97a4cb81
SHA5121aba6f31c2e5bdcb55ea8e61fc4a10644363af27e2c6f0e1a456fafbd9c68b7121e80d1912248d306ab6661dfe184b7d2a447b68d259e0cc9efc556f3580b74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faf899cc00fc8ba3e77b199c33e9c73e
SHA157384830a759fcaeeb652e6198b1d469c546585c
SHA2565f65aca77bdcf95e2265b33fea4ec69524a109a3ce50cab27c9a76138be5a20f
SHA51299e31d7309332fa2b509115ec0a99456fac6951c05033d1b328ac0f4ac255c07fbea8a888f0086e2c3b4dc748231b6bd4d63ce8d336a7aaa364484d9ac93aa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6639227eb72aa3b28d3bb0ce2de2b70
SHA1e18e238d7851a948aae16a1c8f991515f5777482
SHA2567c8c2129ce1a96415e94e1c804ef908906da2465e6cd354cf31f3a61f8e4a196
SHA512375c9447b5741799fcb7b988006c81530b4fa79eac88d5d1200029109fa22ef1a36950373e455b4bd406b3b206beb43eed88cc3526cd84e7a41ea52261ce0aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553985cd5977c6cfa07a9515ee16c7b4e
SHA1dbf22e3088ef892add4da2666d9a7b5e4a71ef17
SHA256cc3d8c4d6ee83c0d64f9b6a1a68eeccebc5f15a44f7fd398ec60d9f085781046
SHA512cb82ed890051b419ab58115fd2f0323d015c9ee0964810559872cbabcc392da9d37c6c2573b7da6c4f8c9aa4d8b1c5d347e45d3f174e6134fcea52700e6bb5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9862903a6e3ef75d13334e2e279954
SHA1cbf7cdfab0273805363caa30aaac278989f234fb
SHA25617093dbf2326e1ce40ca42096c5ac1c8bc9101b14498aef5f581de5e679fb2c2
SHA512bfa7c29d0c12472afbe0d031d866551374cdb04b5ae8804c677cd76f25b3a68c8deca94b29f9b3a593543cbd60206f7ea3f9877a85d70105e003cf52ca661f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7df490f0dad319d208754b3513ebbfc
SHA128826bd543dd748591faf2fa62f229ddb6c046c1
SHA25636d56e0d80e3a076b3b3e071ce245d8d2a949312906eca868236f8f0906ee8f5
SHA51242ab36336493b9894bea6163e9855e52aecefc036e590766767f502fec2949f37b483d2e4d8b82843640e12cd23b98ae478f63a3092b95c0ef46d28778498d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7e098dd28bc2879a6e217994c863ba
SHA132bd637b8b1d4cf2cd29d50847a06ca8496a79fe
SHA256be732f8d9fd490880b3b96df54c68c387a0c5797adf5135aad7294ac3b7d5d43
SHA512a645d17ee451766e08d87a1f5a31cac490b192901f850f014cdae8497a6d83e86abd69e10470043e7269df86a519b89fe9fcaa435ade963c8a84c19fc3f446e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f49c6c8503365596ccc749fcc62f57d9
SHA120e19f26e7e2647d89a12a6d8a68dc6cf78f4c45
SHA25677c05f3cc9e99c6cfc6c5ea87f2815f3a940875f57686f150ddf1633963d5e45
SHA5120ef1fae50be44182cb57cbce2c89fed49a2e6bd122fbf9bc0563d63a75d8eb4858b5659d8426006646ee1bd6afb225f657ad40fbeee638b251a9b3d1c15547e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b806fb5dab3b3ec91acd45d69cda6f70
SHA1e6dadd8d75c54c2f7da04ee226791ce8131707fd
SHA256a8692cf1d711bb9ec6420cb1e1579a967edac190e687495e587b0fdd7a9a61d4
SHA512bedb62fdf16e7d10d12f86539d3e3a5244cd70875463c39a2c53323f9555cf0e1553ce5fdc05a43c835c3ff3ff54af1797fb05b7ac91aefab3996b196905377f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c7b8f74b13a4720dad6bf272c5238c
SHA112db98dc41def7dda5ac675da866942cd127790c
SHA256ffb533a29ec51bdaab30c59a0270f921c7fa0cb6ab56d2ebfe1d881bbec62547
SHA51282346e141c37b8bb888923b2a545c98f004e41b62564a34c0c91331e77b38541d7e232844b20679abf59a67a0c449828908e9ab1b3de38aa229ae8ad8bd2a1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f273c747bd1f2c402af7f259eb6639ae
SHA1637b51af9955c523d82832b0906a7f44c60adefb
SHA2563220d4606fcf351b03ea4d048abc91907b494dbc3b0b7331944cf3a2f4e99a12
SHA5124c91c420673c05efbefc17da27b89c854d42309e77e5187e576f777f3a4056d919c2c2a3c9f940c509494cfb8567a4f5e10f016a0866fbde0ef7c52bee5c46b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ece7d48165ce05648207fea55a38831
SHA1aba42fd06bc4f057976d5024e82a0349db412079
SHA2563f6fe8df660e565ccaed7ac195184b1ab36b8897653c6879edec65dc60c0ea5e
SHA5125ad50bf46d31c27e7efae37c95c37eb6a28eec4b6f9dd8769f9f97bf3a54a27e652fd7dfef2ab5d87086a45233e52db73e0de0ee7318afe38d0b0102afefdb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d857ba69ca7be2c96dc60e1152949774
SHA176fe2177a05f1c2eb2f728e6ee4412353c5e3338
SHA2568c80c8fa7f328e4a367129b1c70d9e6b0582002e72304e43f0e102b3d05b00a2
SHA512ce2a640c8ad7c9a5a67dfce1d7e4aa384e8e8fd0418bcaaa48041e2a5f7cdc5241f1daed3c48beb66892964117f5e18bd1769a3e4612e5b8fa613185b10230ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d957a3e34a10df983b88d73a8a1619
SHA1beecc33fcfb555fab4c5177a9f1f515fd407dcd1
SHA256312270def408989280a4a988db85e9b98896e7652f92808f004056149d9bed04
SHA51244cf8648123755ff09357ba367b5cfc8d4c36a00d5be0d7c20a4b9724d9a1ae2e6a2d01c9ddc287af19a1e9ee2b8184a39664feeba5f7dddf26ba948013dcab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686e06de35fef4231365cf322b5b36f2
SHA1f554eb0f893e2f9d82278d4f40f62b8a9641730a
SHA256262da4d6a32107347d9225f91c17a3ee520036f08de7e8b67d7529aa2c5183bc
SHA512cab27b819859a50cfb31304b8584077cef20308d9276bc0307bf1d7ca10bf3ff7627cca40121a4853d78d0abb802813c266f70cba6a7be3f38b6ba610cdbaca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5988dffc56148d5223e0206508bc3b43e
SHA169cca10fc5bcce81c737323ef0fea60f76639142
SHA2565d192ed4af1531018a32015e8a68ee43c21a51d717537ad7da2d1b06bce77da6
SHA512dfb0d8ad630a73545e4cb241e7e9a6308eedcc97b8e2e467b01cd3d48a43dd22ededa49c1dd040254cff335480bf904d5eff3c76a9bf07a1f5cb82b6cdf4ba7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532188718156f22e3b8657c7cfd9e0d79
SHA1761ed9284f9d7f2f67fe5fa0660edddf8e467289
SHA256773eb732e9fdc1d2f52fbd81700947431e4039246a0a0df29a350cab8833453a
SHA51264d3d935a9a5f1c92ef7cf80903c49d199e1385d5432172defa10f3c8ebe3704e31bf74b4542036103385d02b86f9fe9f418f13b43218e669de8e0872ae5dc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5643c90497196c26f3b284702820057db
SHA133fc84511a6e7b930c3a0c20419ff2dd45789a27
SHA2560263ff3eaa929a047e62595584da4bcf8460c5ac1a331ceb79082db113fa5376
SHA512ddfa88b70d5bfaf95d6a2ea539aaba5a90a4d9245de01bb3fdaba929d2f74b6768c42cf5caf3e0a5715aaf695a56d9ccafa1d951f90a82fe60b49311d252f7ed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a