Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
68b38730bedbe11446f33bbf1298f389_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68b38730bedbe11446f33bbf1298f389_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b38730bedbe11446f33bbf1298f389_JaffaCakes118.html
-
Size
461KB
-
MD5
68b38730bedbe11446f33bbf1298f389
-
SHA1
a378d116f0be1b702b1cb25e7320f5263c753184
-
SHA256
191041c29ccbec3ba4e7da1df45a5b50c95dd980827f49eb3f6973dbf72c63e3
-
SHA512
eeca919bf99f3dc5834356c73de3b2c890e8256f243d083e8194c8946b75dd6cee6256d3d8a3e7cb5971fbaa994b00733d489bf2148b588cf98b94405f2b8306
-
SSDEEP
6144:SnsMYod+X3oI+YJsMYod+X3oI+YIdsMYod+X3oI+YLsMYod+X3oI+YQ:q5d+X3L5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a3da5a8facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82511631-1882-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b1baa9cd358d533c1c50a94a5ae902f71a12330ca0fe1e106ce899d0652de51a000000000e8000000002000020000000dde4edd5b6151ee115344c9c467740cf70a510897d5a1fd3059d9124e8e7b6a9200000008d92f4ef97e5e45a0f7e6710cf34cd5d8560e145f1acc6942cf8d2e1340958b540000000c03529e1a79f80a58cae5ff936c1ddf137ca52fc0fdc3ab89b06143a88f17f5e8edb0710393ce1bec1024c1de1ae408260548e42cf7a28398af2abea7b334d87 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2428 iexplore.exe 2428 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b38730bedbe11446f33bbf1298f389_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8361d66b375c702c228ff24688f79f0
SHA11684c694407553b2a518c92d0fbdfb8e63789cc8
SHA2565b908aa91d0c8cef59c7277370ad649411dd63fdc1b757a6f07ed49ee333fe1a
SHA51246dbf353eda7bc3e50888675d4c4e08a68f07c3df3202afb8650aca6d11cddb5cef7e6ec6ccfade63f8dc74aa9afee527f8e445ddd47fd1e8fcf7e8e4aa906a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e53318df81936b0a9d580a091b8d7ef6
SHA11d869989d5d0b932f966b604de97aebe5d5d8b34
SHA256d7eaadebc38de329862ee202db5d7e794781a24e32885622b0391b0736f7a84b
SHA512fa2da3cf9660ba69417f90b456d1aa9f4e35c681a4fe2c96512c8fa51f0f1988472780d50ebcb5409cb9f52d57916523ee6449bb143413c54fab11bcfdbf2e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d789769e35b885df5273a0aad1a24546
SHA185eb5cea5d1ccac25b10794200a57d6c05bb39e6
SHA256e8afb8d467549ca98b26edae929c488b2a082eb718b5fa7894644dd12fc3ffa2
SHA5121d39db5c5965c64cc03998210698d20e651f86201fce6c8c801e7fd87ce78356a27ba979462831d9a1dbe56fbc4122d3cecc0ba48d4f211a490df47160d77ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd269dc9a3031d3e33572a6c40fcda6b
SHA1daabab6c0d2731ce6c6334ac121edf9f1c78b296
SHA256dfb7131d7452f65fc2ec1a52d8004aed86f3714055e89476d5020b0ef2659b51
SHA512aa949ac8035e6312d943352bb726e0f2620c63ddf1790e5a09d6ca905de3475a904656a9c690780bbf08b2a4bb9c418f0cc9f2d7e1f170d301916277550b445b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50959bc201297ec84c51a141d87bf169e
SHA1f71bd6bfef38c36f4d9e7ce9378f381ead01b168
SHA256d4f68acc1b0a122fdf01752d10df8379ccb5a33b69875b04bcf23ea01c123a2e
SHA512dfd1a7990fa11e853b2ffc8df4e5654ff12d55c886b4b7461fecfcfde81e56c3ab2917a62251aa51be8b65a76a9a263777a480748e9440772f234c6ce76d8596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a81328efa4eccf17226f841ebd7c5d3e
SHA1316cbc3d2bf0c977bb7001b36a353f0cce51703b
SHA2567b0eed26495214ea21ceec69a0451c4e1e0bd91b8383c293c106ee194a091475
SHA512491739a1d50a6fe54de64cb09a6c65e0758cf9b2e6d66fcf97f493e3bd1ff88113fc437f0fb0f393ee36d0b5d73fecdf20fed96e219d6d967ad6522208886d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f45016aea1415debca2c1d77df8c88
SHA1849637f0292ed5c69a39e03ba0ea6ae004ba5090
SHA25600cb81727561204b56f3278079c2eb259a3cae0b30b0ddc98b53d6f3281e8f99
SHA5121609fef5ac043d7ec2b19dcb53748c8de24e386596a5a49cb41d1626c517273bb69f5eb49899489063adcd2f294ae7feae05da8e39a6c3e726cb055fbccbddcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91f9ef4493d74427175a827e224e917
SHA140ae618061104256c7e5ad9cd8da23a19f74d46c
SHA2560e9b4d001d5bbcad7db11345b378af99d7a3a8b0afaa7fc6a6edea59eca3c790
SHA512b6f7f497376dd79b85fecba51d9996af1bb902e99ea82edb17e80e4ac7238d0b4cc8e1c74c6f33075578d97d5a2e6ed04f85168768cbc0d527253f9a3c36511f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa576d44b70678b4663fc6434c93857
SHA166161bd4ff41375342312c02c245a6e9e97b2711
SHA256ef5da975a1b2c7a4b2d1e5fdce97e79c88a01aa803d61b4799daf143bcf89691
SHA512868cd6edac22e35f17e68dd1f686fd6d5709e976e65737becec2621d1879fe5cfc88da54471dadad7f19c3f0ff1a24d14033ee4a18d10a1413c7db90d5eea1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510e6a8eede31d1e70f0fe6353b379b7c
SHA19aa9be726674d9c9a2d2f903203b295a1596d891
SHA25660e170a536a5db7599ace34355a1c0df0d5b1102e1bc061d88416713eb97a88f
SHA512aabb1bb85bf84c5da958ad1e140da0ea1a6a34b2cc0354a777cce7f3d226b4bc4800bc5874a15af8e9e1ccb70721d860b80e6fd64d9109269c7e7b42b71319b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc438f29d777bb772a4357ac850465ba
SHA1c5ff209809b771001b2faed66a47aaed2a31fe83
SHA256362c5cb8a37c5a5d16b8b1afde4d33f7fc7fd63fe8dd3aa354b2417313b21a04
SHA51297548fbc5e8fc55d1c9c8bb1806d85e67a076cfb6a0d4fd792e8d3a48726ad00b982d6281d8bfa74ee02e4b8760796263967c2e2ab0222bf5c24d11a880482d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fdf9713f5af5f33c9fbcd42c5780f7c
SHA1d11bc60038078155e6ff4625dea868cd49eddb56
SHA2566ad07a182e97e9b0cd607e274b6d0bf14f05167e5b5de5275626a356ae613dfe
SHA512331310608c67b450ffda5e1b0def9936b95bc63d2af3b40fba83b9ea4757be47ee2d78beeaaf62416d6dd61bbd573c1c9d8c945222d62aba8b73e82ff7cca4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c67b5bf36569dd0276881ecfe065c167
SHA1a1ed4ee6a7d420f7e8d7ba92e9ac6f0d6ee03f40
SHA256c01ca06d31cdcfa72750432ca419ac17d438ba956e0d6a397611f29a524ed406
SHA5129712dd02448cae974dc89dccaaf9d63bfcf41979ab7dc4e5ecfd3f50182abe2f68c954207a64922bc25114bbf78609e12852de55e6c4cbd8357d9adf1a0d272f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df17c52e474352e8a2a2c1c493d6e579
SHA1a9d2df076216997bcb73aa40d31bd3ad5ffaf096
SHA2568bfda60dd59b0c64ca6e2d59b8509d0ba0eaee25f730948acdae630c2621a19c
SHA51278f0e6045c0d688b2e7cc1c953d0ff38a7ff4ff8a956b06f8abcb486ce9a893786567f6d6b2914c2256ea9d0885cc20182f3fcbf1dc0f1a060791c709d83069f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e24c2ef376693fce78cfcc7ab8f39316
SHA10947c26bdb1a7fb1cd9a1c8ecb1a48c44019d0f0
SHA25651bbf4e4bd3e2fd6cf666b0972f5da2114a489db7ac291f15373f0393d09eea4
SHA5127ac223e9d8255560047149b722717ad22fd902a146196eb08a917a674685bd3365fa1918800c57eeee6d6da03aafab2e787699d9e9862a6135fa4cbad3849ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f11805fdede8f3b1b1272b35d813bf0
SHA1f42d3d8b7d21fba650be00109c323c89b6d475e2
SHA25674dd4213304c0382a9c60d84fca698cf1d9cd6f62868d5f394358f2fe6756215
SHA512c08d991521abe65e25009b0aa5d2d5afd7b7093c689e740d052aa3f10e1b327a3e370a89908b7b48a2f95c1f49ceb8561a054c8f63da1f1d7a5df38ae92e701d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5654fc24311dd350f1a0264025092a412
SHA121c7cb7fec1585fbebd38d9cd9fba20563dfdecf
SHA2562c511127821db6dfe2ce6e014a408eb3d1a9bb3ba674f6f920e9c9f6e1a2971c
SHA512eafc170a74e0471ed417c7b809d31cf19131830831ae2863fbcd379271a8a7ed73515ec669c940e6bb9bca3920da2f7c278202c85f8a9593956379a0a8a195bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5196d5acf5dcdb9062b89fd67586f07e5
SHA1292acaaf0eca0d5aeddd3090a1d2fb315dd8ca3e
SHA256c6d8019f4e6b48b3c28f9b5260f9f0f399c5344074b89e101c1a095133a2ac00
SHA512db49728e2c220864b1d5780bfd3b20a6b33f6ac48089dc0ff3335ffec7064ae114ec323d4f5ec06d7d0d2b97b4e4a1fff4877c887b53cfefe6687f5214210c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a3f851867d4e16962f8e698fd9576a8
SHA123409a3899ce4d465b5f68b5e2913262bc8eb718
SHA256c8138461bc2c6a36995a5cd1bdd0f59731b14b622ebc62ee4ac1bb815dfe1f4e
SHA51299d446ef68d999f32f11e8c31d34dc52ed8d76e1f1b47801aa38258a2afdcf0aab3822ffaffb0323634fb00d9eaa1b2d56468bffaf87c268e14b7d7fb2e1ab5a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a