Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
68bdcf939f05b2b335ba282c5f1148ac_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68bdcf939f05b2b335ba282c5f1148ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68bdcf939f05b2b335ba282c5f1148ac_JaffaCakes118.html
-
Size
31KB
-
MD5
68bdcf939f05b2b335ba282c5f1148ac
-
SHA1
927047ef7ea907a332e5ba57f754df06f6bdc6a0
-
SHA256
b5eb8f55b401eea14c9ca735c016881d2a91eb4db4c1cf7765af900ddb447fa6
-
SHA512
d403c96f9f46fa90784cdf33f808f124420bb0b0c522a4e41df1d103d5a19736f0f4b8713044c8f084d922a4fe55d588605835b7b5388ca00eb3fc851757db70
-
SSDEEP
384:jxdDmlPPc5pOOCBeuuFIFL8N6rthQuIfNaPG58KnucKwX:FTCBeRaLFrthQffN6WnuAX
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40db796991acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92793771-1884-11EF-90CD-4A18CE615B84} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f515451ab7ce811cf71180212a95752bd33fcb04694410dd8aff912ada24f556000000000e800000000200002000000028530cc3f1b260df5a50babe818f3df4a0f791834cbe5b13065dac0fd57e7ed520000000823bfa672cabc93194bffeb5f2640326efeb5fd5c79fe0bf99b4ce908ea72cb640000000f50e31d3cf62831473f7efab2627e203330f7352c186b2538922318c78e43f1038029c33f8e86969ee6a6f303845270d870a9b61ff217f67c5d26650cc20ab03 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1992 iexplore.exe 1992 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1992 wrote to memory of 3060 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 3060 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 3060 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 3060 1992 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68bdcf939f05b2b335ba282c5f1148ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c8d2f700e634c4eddb446784240d7f74
SHA134077e26b8ca68037892b7abc8ce2acc32bbccc9
SHA25623e8ea7f7f73aa1c280cdba1a77ed76bf783cc536606f396ede9ca76fcb3d0a0
SHA5127504de743ff33e192870c90fd133e16de1e55aed5ca7ea51c25913722acd19dcb77a76bec8b9cabd2964ecee811259ffeba95d5849835d5ec634c5f36b8e8916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586afe0f30f37d8f6a2f781fee90468a8
SHA1e922e7b75befd9af2759a55653c33714d53147e1
SHA256f4429ea2f59e4ca984030a33a5f1d025aec5aa68b629332652cc5f7b58f999ff
SHA51229997605cba9df1259172bf553d9e3de06004cf429220c3adc149de03d35b4b9ca79aa9b09bf62f8e279a88d6f88e9476604c6ac98d7d2bc8d7ce62256d683c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59af5543a47c7166e98720f08c63151bf
SHA1bdc0127fc2fb7fe1320215e20a098e5170c509ec
SHA2564e1f1f590c6c36fc7c0b949c68bebf0ab8b3742aa94e8ffe25e9e5cfa783197a
SHA51239b2a43f11f5c559a66c0801175b8e17ac3363577dc0eef65e155f8d90959a28f5e862c564aae31909453a021ea5b326daa38206be7215326097525d157d9eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef51577383e2e79e9c7ea89e8f3441f
SHA165aca0d0e26b872a71df747aafef48a4a0722a45
SHA256f9055474726e99765d454ab0cdc57635cf96fe0a0acececbb3881cdc7e02bce6
SHA5120483643802f54ea733f412a7e66b43cc5ca62448badb7994a49c788fdf62e74912179c82350ec3d1c3ffe6bb02b768162e7a10f1ccfc09b1ac341e547f298f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca595552f2a0ce8194c79ff580702459
SHA1821aaf0da0a7faac32f8a94cfe6cb8c577c78604
SHA2563496d78668f5e623486e65701421d71c68a66b5a62863c7a8be29ebada7f65a2
SHA512d35f76ec892d1fac491b046a3ee7dc916bd14f56264c2f0f3a2112acc3a24a0a02ba39676679151a7395fb785533e5ac1c23fe1115576b2a2b1126c220beb362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568eff44f0960adadfdc550229ac63bdf
SHA1bf26fec0afc5ee66300e1c6bda5c4e13a641f17b
SHA2566f2647e925013ffef3035956745003db89e671df81d167b491f07bb0229fb3e0
SHA5120bb607d8cdda8438415a9c793554358319c6139630b4bc1b3e33a9173f25d614504f331d2d4c9ee43e7a2656f9260615f5025d26a36339506a04275c47e15590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51856e85f79fe54b8b4c123408b249bfa
SHA1fb92682ed09e2d8c539816893f7dc23c00d2a6db
SHA256ca8efe1b084c0ab8154a7e5629704b97d2b23e0af9a984c6731dcdb2e10a767f
SHA512cad7ea88b82d78cb83c46ab238ecf43ec21d1f1e0ea26b67786107832217137141f81a127757e637c67c5b912e5dcb3bdf9cd1812f049835ca541cd8216cb027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0003a653d51bb6d87c51d6ca53fcde7
SHA1598c83c054eb84183f25c782c616cd20e190b3c2
SHA25647dc33651069a03d39fa04fcfb6990f76be2be085f08b01e18fcd97ebe875737
SHA5122eeb7dfad006b3223f1a1c99cdded1140417c0baefadbf6cf9ad77d4e177869e1aede85a8ba2db62cec6cd6f0972bc3c99321fb448f1eb8675da7f2246aa5e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5517c8b88cff161d81e841bf53d64b8d9
SHA1b2a24f3dd9ea774f3d1ae9f47bb1f15ceb1f507f
SHA256466835aafb40fff04ee1cc4ce948a309e6b7833ceac56d00cf405fa9350dd057
SHA512c006810477be7143b671323eaa2b9616cf2414edbdaca9f719f660407ce070d06c4a5eb1f297eb3c4de0234ea374beab31aaca71cc89b82e9d428ea366962078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c63c923c716eb70380885126a22b279
SHA1978c4da612542f52ee08bec6b1542dea39d7d1f3
SHA256ee30b89093624bf999855fcddb8134b4b97390705b3db1a3c0fc4e8d67509dd0
SHA51209dc459498c4f176b0114e5f940e29dde942cfb148e14b4d0d413fa298ff06c1faf4fd6ad387f6aa526d2cc0f637e3696b697303dbbe8813ca6076a0636ce6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac59c69a7c0dd07f86ddbb85cbacb6f
SHA1792f48a9970924577d1540085f5d1ff831693348
SHA256302301d94ba1e2546c33d6bec4318cc16228029ebe64d9ba61af1d07221303f8
SHA512674984dbee5bba66a14aa1bc0bb56be1e7a417c4e21e5b24444c413b13da242d981e880c8ffe94a736f5149570f1d65b80755b161223033726ba0f873db85055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1722587a43860c04b1585eaa0b6014
SHA157e8bc9af10ade791560efd6b4c63826da2d8905
SHA2568f5b11b16ba44bf829f11a5afc68dad29e557139afe9c112ad97c3adc10626df
SHA5125bef3da95e89808e9e97f28b608aefd07a39a9edd12fb555ea3c67e6ea1db07b2ab3bd5065cfd8c2bd977791ecbd2cdf89fb3c11a9b0735ec7e483ce95f9456d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebab4752caf88b096959416e0758c44
SHA1a688a9a2fc04af2483c55d6173086abd2841d299
SHA25693bce86ecc712192a8a47d67a081f9de9105fe9a4ec8cc4e2d365c07b7f0e8ad
SHA51272e0ee293c9954e70fd0e14b6d927b215ba6db8655ff9c08672cc7f046a61d3290a14fa3edfb65b79110375d4270e51d38e3f73b62385ea9054b03dee82582fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD510ce0a90781f57102d84051810e5e82c
SHA1bd2d2281fa51ac709e095ab857c2d446e140775f
SHA256f0f8b30cd737b8aaa81f5af047b2610dab22465e333292618d9df3598f99e830
SHA512eea9b7fa122f13c2c01b91153d2f20dff18b5b989de65df2eea265da9bddd462be404b9ae6dbfb97410fdd144929364385650b91339b6545e35199ec706a767c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\O252B7Q6.htm
Filesize80KB
MD582a370e638240c365666e53c0089faf2
SHA1aac17fc26eb38cd30d5fd0e6ff7c610796914ed2
SHA256936ff8567326f8a0795e0ebde7be033e298c99d20b937e8485366e86a545a1e3
SHA512f771f68ab97ad947ffec1b8a66bb4d5d4a0f864b3b468854d84d1493c972323dfc86c743d3731a4ad98c001ecdd7f1aa1594a45ae91ae55c4e8c207c19fbb01c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\cb=gapi[1].js
Filesize64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a