Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
68b316a7e2d3b7b62113d2db0f41276b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68b316a7e2d3b7b62113d2db0f41276b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b316a7e2d3b7b62113d2db0f41276b_JaffaCakes118.html
-
Size
461KB
-
MD5
68b316a7e2d3b7b62113d2db0f41276b
-
SHA1
7e680a669b6b18372f5d7e54d017a67b984b45f4
-
SHA256
a88e1fdc7b21930b0500de007ff3afcfeb795e875397c08cd993dcaf43cdeac2
-
SHA512
4f0aa94388f584d0b55cde32482c913dbf1f27715d0c6749ffd5f4babef6d3c18687fbcdfd3b630b79ad8c49af15f30b04d0b45e9d08478879989b15e9aca039
-
SSDEEP
6144:SwsMYod+X3oI+YdcsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3a5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575265" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F5131F1-1882-11EF-BF06-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0443a488facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000088a49d60fcdacf409b310e6e513069d7000000000200000000001066000000010000200000001cd87105cdc3f06a2aaedc456a2536e2958451c4c5e763fcf4f0cb5da5c1ad48000000000e8000000002000020000000462adbaae6113a3506727173def8038e89866c35152dabf54b9dcbc6c99f7ef920000000c094267780b26fb61ed3970ec0ee7793db6720aee9f878ad2cac83c45014612e40000000495b7caddd53eae55ffa52531e3cdf85bd0b038ecebb6c20b5276235c60eea9b9dc7ac4411f5d52ee0257c16547d663842c78de3b68030507378490af787d226 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 612 iexplore.exe 612 iexplore.exe 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 612 wrote to memory of 1904 612 iexplore.exe IEXPLORE.EXE PID 612 wrote to memory of 1904 612 iexplore.exe IEXPLORE.EXE PID 612 wrote to memory of 1904 612 iexplore.exe IEXPLORE.EXE PID 612 wrote to memory of 1904 612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b316a7e2d3b7b62113d2db0f41276b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca182685982a47a59a34bc2a7e9d61a
SHA1f30dbdc9bb61dfb37e25677fcea6cfab742c12e7
SHA2561eec85d7ea53e23e6444cd3378962dfaf2300268d2acb2648f155f3009d5e09e
SHA5125daf0fbc2bdeffcbe28aabffa612b9fc4eddaca365aadffad09ac6247c033a3c7eb124e7106a17821e9d9cdbf51edc8ef6163f9a70243fb656e7c4e9f928f0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48ff1c9048dbeefc2433b7908d8053a
SHA13092a2c068b1a084384d222fc7ff35bfd3aa44cc
SHA2568b2d21066389cd8dc7c14df7b70888c053ac658e217f7376153240a4476df546
SHA5126f8eac89a2ab7045ee2ed02da7c1235f90a26911245a24b022aa2f35f7bbdaf7e2504e10327abe1c307d3e4c0986481a39a45db6ca9da93110f755ab0a14965b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d5e6902445f28077800b53eb781c01
SHA171ed52d65d3006fe53eb5b5c4ccc69003cb68cdb
SHA2565d6e7403fdcb7ce19a215549521bf521c49c6e480f64aaf07cab52ffd7eec0ab
SHA51284ff2b4b0b455b0a19b2cc5df313281ed09a5055bd4accf6128d73cee8dee8777dab8f43f8f2354e56a8fe2c2809340e5668b571b06bae6b95ce77e1aa300fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532651eee2d0ecbfce40c83bbe3f29623
SHA12934c2e7dbc3486010d817f01026c3e7a7ce8739
SHA256347032f1e48574766b8db29c5e1ab39b545157efd7f4a937c07ffb65c3f93376
SHA5122a203a2d3bcf14b218c28896989c2669073e16766a757f00973220e45aab3c6a6b71f64b50ebb07f1a6838618deeba5a3084db3c1d3f7e44482046eab258a974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b26d1828555c3058a8710c8137087710
SHA14f5e6a9f2736bddaad775325bb9c38c925149020
SHA2561034e64af4ccdd355e7de952890868936f08caf0abd9863eb8956e487f647726
SHA51272a7398d041923fd67cc7288b5a99b63bb34f381ff3374aeb2f917396bac4c4e87a1882613b04cc50ebf1d0f7e99a081198ae9c0e707d59c5eec6e60588ac6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af6b05cd310b1a86d3d068b523e1c415
SHA1db45088374e758d6a4f168678684005d46cf3833
SHA2567c56f1fd534b6e62347cd55f17828b5830d9321044b5853acc15a195e6f67d3b
SHA5123dee85fbf6a753d96f73ffeb2b7f25b8405d6683ecb59c109dfcc8547ea7e764eb68f1b73b5d3e9ac9775254e7774115722447c522205c861fa46c25c35d6032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506a81a6d0f89e6201e8bcc9c88d2dc0a
SHA1bf6bfb5f0a10edcfb992066f3c95fb471392f37d
SHA2563e72ce7be54232602fed785a770e638a5a9c7435359158f832695bab0989b44c
SHA5128de78d988b651605bfd8171b3ac1e6bf490d1132dab3174387c9d653110a14096ee41edf8947ee53ab491feaf51593e498ab273ff14ee47751d9c7b4e9faac47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c287ffc0bf617a3fe26d690b777f0ab
SHA13436b9d7575693044466afa60df5970f901cba5c
SHA25691e082f541b516d9b5725609a2ff2e0cbe8ef9853e5a93a2731a8d72738432ad
SHA512e6d2717a592e420302f74c9aa57bc33ece4196ab24d65f367e6e035f8451eb40bd638c659f4bcdb9a93c37d0faf3c150b662fbc1176a03f71d0ea38dc7857a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e37057fdb1c2a8d45ff45c60bdb62fa
SHA1d9d948b4841595d37f20e80330b704e67f90c311
SHA2568f196091542fe1eddc2d60f954e9ff63840ae8a5148a8df24251e7cd00209365
SHA5125237434149b6c1bcbe9a205711a62b2d1a93f90e05a64bc9add4afb6c8d36d3fe407352978726cf8ef108fd7f1cccfbe1d76a58f1abfd82c04a8726b1ba70a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b04083ee6cd51b826a3222cd120c144
SHA1aae62c9b4bcd79de60b987c9b7106f58d267113a
SHA2561b4243a68ccd3c88d14cd56441f3f3eb359df68a37ef92e9a95c091cdf0f5702
SHA512d5de781239177a7b35c7cbba862fce26d60094e4f30352772d7fdcfb65951feaea6e9b8a3de373784c1dff52c2a66ffeb774a64bf3c6a0a5c623a31bba85252d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9073231bea227764e56a3a506510779
SHA117d87dfbc14e8ea3b5708ea81b3dece3a6990d24
SHA25684b45e0e6bf89ca2f4e8948f853f7642f2caf05932c397f5db90ba198290fc22
SHA51246adcaaa0a66872a2d4661e1ab2c4dbf8952232fd6f9bb2f46d9a4d3b8dda951e888ba722459cc7bab81c312d73170c8f966a34c6db01fb78312509df580c134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e72cd2a84cb82e6660d5b69cd1bcfd8
SHA1a30589b14d41b1a1e5022ea79e08f59b4bf09bdd
SHA2566cc91f1eeecd30c3bf96f48a9503476604bb4531d862001f784b297d5dc284c9
SHA51299b76b8c21df410c8ddc4c0440a6fe3fa7700fd2d5c663ef7aa7564a48ae7255e9f049ef131ef1edd913568c86f01f8348d4654310f0cd79061a5a41942a98a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1493485a61a0d186077a5e2f5f39cea
SHA13b44aa27832a651cba90da90a104c8837e4ecbaa
SHA256fbd3c4b5b0f1210bf5a41423c39e27a0adaa7d125f7160c56a444e799d8d4017
SHA51248fdeeeb28e0d31b2b1ed981c789f57195fb20905e4440a2a96df138536a25e1e56cf7c43be0a39f80a501e9d0a8536bb0933d6c641ec1f97fa33797c75b6e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5165d2dfc01824a6eccf9332eb3a679c4
SHA1871c2b914956d57425829ab01b83346c0d27f859
SHA2561cbc0c71e471a2e6b13f5f59d6f8fd761d5a17f06fc2e838695e6c68697898d2
SHA512b843b38dadb916173b2793e6b7244f84430f88745a185bd5239a9c8c88661457a0aa22b16c32843edeb7fd793a5c2328f6e9b5638e2d848219c727950ff63209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3130d45e0866adebd06ee80aa7048e3
SHA182f70ff4c1271cc38ad17b91929116a1e8c19c28
SHA256247957f1cdbc356af92f6b1fa7fefe4c12200fe76a546627021a2d8c00971ad3
SHA512080d1f3605300d4010cc36716f9a795f2499a52d84d388587cba14d318ba8964474bdadc3fdc61f2f84e24d25cb5fcdea9a875615c970b7e8e6e968455bf60d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54299f4d31a826214504a911c2eab78ab
SHA18c906687c3aaf727b12fe3d87ebdaca1746ed0a9
SHA256c3896649f28691b164fd57af9c9abdfdd40bb43e341b55da084e45104ddc043d
SHA512f4dffd2c100a3eb2972f7a2ea8bb96cb7df3821aec8b6d80e943b2619e28149cd07c411e190008a5f9a077783a36ea03bf4c898db29f9a99fc191fbac5dbcdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792bc23d019f0e82a62cc75b3df43f73
SHA11768a2a1b3819c4f0a96759132c4ef07a57fb613
SHA256bae88b7fbf36dad8e3b4e10e0606516953958719a432ea798527e10b5c2a0e7f
SHA5120ac01f4842e3d3f6eb63ff4d080349fb182c66ffbe0d73ec0ef44f4194482d829026214ad27b4e9288fd6818e0c4fe7c3fcfa03a6a5f4a21e0b4dfc61075574d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504dbca2cba987f11bbcdb8581cc37ec1
SHA1cd5cb8ae27f3fae18f8d94a26e2218003d15aad2
SHA25658adc6fbd2319f486e710638b3a9cd4b7e9338466a20ea0f959db6131e7c3dc5
SHA512a1d45ded8e2380c78d7626029b9af637150d3682681ce82346f6343d2e21198fb68ab3050d8bb9ee8c3dbff8b84990abf823d02cd825e48d6df4e58137937e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c0dbf25c5c2e1bcf254f6a728b68fa
SHA1489678406184f84942ff1f09a671a0262b46c23d
SHA256441ac40c7b19db251e155670613b5c5b2e0d6f37dd7b33ae292f09d389be84f2
SHA512678ba9b33fa20dd2e592254b15736a0344579b30743ec3bb0853328b92968e31cf96e0585773badeab86f20fe4156e434f027c1f6130e0ed0cc36f70ce3aeb42
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a