Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
68b8e790f3533497d515ad3fd0253233_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68b8e790f3533497d515ad3fd0253233_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68b8e790f3533497d515ad3fd0253233_JaffaCakes118.html
-
Size
20KB
-
MD5
68b8e790f3533497d515ad3fd0253233
-
SHA1
c9adfbfaa6c5033fa07e8dd6d7ab6fb0ff169540
-
SHA256
2b54a942937acd1dd6f3c185bd70a1a8f3e0e5973fbe7500321693e709c5f7e2
-
SHA512
b33b6170f75f232a04ea4332475c91ae716316d965e39eab3ce627a9a720e70d46977a117e26f67b9a72149429119c4947b27e0fc8609b58babe8156a2173d50
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIA4+zUnjBhaM82qDB8:SIMd0I5nvHTsvafxDB8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422575779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1AA07C1-1883-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2212 iexplore.exe 2212 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2212 wrote to memory of 3004 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 3004 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 3004 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 3004 2212 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68b8e790f3533497d515ad3fd0253233_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799927c16ff1dde0f4c842b985a001d3
SHA1c3ab24409e1425af61b0f16a533ced1326e10e79
SHA25615d487237845a3c7d6b30fb0b8333aa9b8794f9564ff3b98a1a1f393601bcbd1
SHA5126651d74acca31fda87c22a9dd99a2870ff74b4d8a6340f3249363c22163a3d3242c321790afbd7d433d53308a8e6c85df2518b46eb328f15ae86dbbc201d5426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f072797011c3ca0232c215c1afee2812
SHA11eeb4cfb340745a39c2a4939f3dfbdf1a7396dce
SHA25681cf27392050a485098c015c40aec7f63650bf4362c9bc07574c9e0c48afbe35
SHA512269add12692f464538275c6cf5326e802a78405139491f792dfe822cf8b96410ab8cb85b6049e48f322c872ee0698f88c903d0b98fce401d9fe858afd17518f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50324f778467882b1ea15bb22ee597a54
SHA15156d67e38a7e16f7350782fa43ba1e3271cf5be
SHA256135e782120063d04649fcc75f85bccc5a7a1584d534eababebf922a1608bb1d7
SHA5129a19b713b3043e40cb5c261095e297adcbadae1dc95f152bf0643738c9caa3480bc5bc827d35c2542baf4184b6c1f907d8d81f9964aab102e32c1d51327a980a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfeecdbe357447b11853fdba452a24da
SHA1c83b714082b8630820d970472ade6bfacd19ba48
SHA256da94a29fa4cbee646dcaa3a18d5cb6cd72b3951581c35a381dd6ec3412b0c3e5
SHA512bf5a333ff05157d71afaf522632083ede48f8f7692663e1aa26c268bedae909ea2e4ab2af0dc60bb6f7cabd179f03bc2230549c8238c1d14d3c7b49a73a26fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d7d77b417d729c86bfecf1e2239575
SHA1159acf7a2e78404a6b13743f9f7e4ea8225bf0c1
SHA256a2082c47c2f425070b7a471a6285be59bc2b00b9e728c56546974aee3a9d8f9b
SHA5128ce6d8249060edce2de5491947cd0b3e8f602a53ed96c89747eacf35cb15ff2a47dc39e1c4e82422c5ca3527dac481cf37f4510109629f45b3fd12ce4c0e56c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde070df2ad8216b142a68d5a459fe8d
SHA19f9fa0af6f90d46741c0406761fdd9be9acceb86
SHA25609f624825ddc81e3f2022c173d49c18bff093bd7467b36bb86689599daf298be
SHA5128bd4f3faef3bd3435be13dc06f4f748f94ae15b898d6096e2930ade3a641281f6e5cb15823f99df26dccd0beebe5cc7d0cc6c229cc85e9ec6ef16e5b431643cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56670a131a950ca9e438826042f69471b
SHA17471cc544a152912bb8570f397f051ba215d036f
SHA25685037fa77b3e85495c429ed9f349b8963d4f1504c28a67f0bfd7213d8e0d6045
SHA51262d9a9cd019ddcd83e2a8d0440134cdcf7e3f9251471d18671bc8740d84247981b541bb52310072dd6d18852e0c3d66f2f4d402f8598db9dc332ffc5ae7e3c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26a00f0ed7772f4e6272171c04cc7b5
SHA138124f03968d6e9aaf05afd949710e80190c338e
SHA256b4a589a002c33cef64ab1adda2cd79818f466edee37e3cb1e3d76ef18baf0e82
SHA5120424fc4e153ebba6385efcb9f435dd171f096417a4eae05c55535eb739c45778a0b701def2fb7815a8f036b92c3c17c46ecf4d01476afa022f788a746413d137
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a