Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
68bd1889530db3e9d380927e92027cc7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68bd1889530db3e9d380927e92027cc7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68bd1889530db3e9d380927e92027cc7_JaffaCakes118.html
-
Size
18KB
-
MD5
68bd1889530db3e9d380927e92027cc7
-
SHA1
02df73b2fc04727413de1c5b25e28ac2d95020eb
-
SHA256
411046ac9930c3d9a9b64f718a20db4a72259ad0fa537fee64c2dd9c2de9ae60
-
SHA512
f5dfc8a552e02648412420c3dffcbd0e7a4012f0126f664372f7d3f6bfc2599fb2a64959fa0e55120230a92bd24959f1ae9ce14f7cb18c8026deb7a863843bc9
-
SSDEEP
384:t56ubg1ZT5a59E1hEa2ftqQ63e/u1W0ZSeJhY/sE2A4HWC2q371sg5hR+wO371+g:au1qEW1W9eD7SB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{723A74B1-1884-11EF-9340-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70709a4791acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000929fd894c8ecc940b4e0cf0a4ded14ed000000000200000000001066000000010000200000007fa9175964842b9639fca74a175e6722bc81f7ca7991b8d796957c1d74c34f37000000000e8000000002000020000000cd593d2c7502ac5a23d58849f01b3162b402181eb237d2d32097c031a786a2952000000034ce05c574348e9e743ea29b1f968c9246e26ceb0022f0865536270716521c57400000004bf25104d625e45b16148b6232a62b7da0ee84485bf8b4436f6fc6ec52dde4124443e8187e4b0fb625793afeb2891801e7a14cbe8b2a46f4924ff90aebbbcfe1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1812 iexplore.exe 1812 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1812 wrote to memory of 2300 1812 iexplore.exe IEXPLORE.EXE PID 1812 wrote to memory of 2300 1812 iexplore.exe IEXPLORE.EXE PID 1812 wrote to memory of 2300 1812 iexplore.exe IEXPLORE.EXE PID 1812 wrote to memory of 2300 1812 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68bd1889530db3e9d380927e92027cc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55353548ca53dee561de5d07bd2eb3679
SHA1fda38ad50dac20b2141b7475f00ca58464cb054a
SHA2568e364f6ebe1af15a0a9e3d2b870fa8c54d47d143a914fdf72ffe1720bddb96b1
SHA5120d51533ddee59b3c942f96c5eb1ef137940239c3108fc164811b59ad0c87f82ccd13cff1d862436e2e987c11f3f2ad11c9e4cf37e2d2822a59a5b6e7076da934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af5ea5d04f948ac759a75cac42bf9d4
SHA1695a53ebfcc426138f8255bdc626dcc15031d3f1
SHA256435b4e8e2419eca250212a9e77089411e51cb6e7dc589f9f99090e52a2b9c94a
SHA5121cfde6926359ce6409bcecac9187a42a868831785bd17f1d1cfe00007f779b3ff0428b04e7a87798bd568c0e4e8c46ef732947d642855b49ef4ad1f2ebcc1fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560d3814f8330603fb6abe76109cc265d
SHA113c7a5350215c4aa1a29a582eabd33d08c0fb2bb
SHA25666177885f9e337d5a1f887ac69ae0046861fdec6b39260673c32f87fa14dd8a2
SHA512699385032010203c82119f9d24012582b7f409eaf22a4b90d554cabeffb4b581a540b9af13ea9138d943ee047921b434a00e258d346f901a688270660f6a1439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9cbb5707b43461f839db88f28b55e9
SHA1efb605c672bec74e2a76bfeb527ea8c9b18268e0
SHA2561ea95710c2e17066bbd85f1715845253274c356e4bbf6aaa7d1214c105bf1926
SHA51265d6913e8dc1cdc2ecdaba48f477104bdbaacb622b7eee8eddc80d02a5a5329134d5204c1f07c99321dc5bbbaa8508c81c147500fcbe6d9e8efa2c56995c9e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efd20ffdd655ea9048de4f4952b08a12
SHA1e0e27c1adee0e51b28204989f2f63e08f372a1df
SHA2566e11d7c0e62a2d440bdbd4ac51cee4ec8399a12a61abbd6a5c6dec4ebc056118
SHA512fcb237ae567e0210eb48527962476f5a6509145b7a585a96a0aa4f1ad03a746a5d13b33fcb838063474a3161bffbb0dba083aa5105eeaff4f7b3869f5604ee01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add560d9b47a4ea62d471f506e071d43
SHA1ab8de6e0dcf39120ecdd403867a51428aa69b256
SHA25682f3c7fea83f96c34aba7a916cd21b314c56d802b51be9cedbbf4de5d96b65e3
SHA5127157c31055189b14ae243f6f3ac57b273a59cbc7f45e80c088fb36a418c0e10d7d15c3743ac19b23f014cbb06850afec41058a50219a9b1177f6ebda4603730c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf30efae28dd528790ee422f2df66dba
SHA117b90681525a8b269889f7b5bf61ce5e53d88d59
SHA2562fec9e8351055d0e8654b128ca9a2dbea2a0c9f6ab81226f50fd22b20e931174
SHA512753adb4f21d5d96947bd6915656f6f469b5569b2a38ad8f1b41339694534fd4b416f6246ad0bdef3302dc005d70220f5fc12f70c28e6c7fb22c53af0d1de71f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52692d837211e571ac6d1aa720e5998cc
SHA189e4cfa186967bd6116871ac5a161220149a5382
SHA256a4bcb84b06af4f239d5c78adc34592198c580dd1c046d468e930ffae53f280fd
SHA51275002a385a0cccaaccf7b5bd37b7d6a141a0031cf6f70579b07e072a186468377c1b867becab2a35ffbde5ffa8080d6410797fdce71dc887e5012022ba0316b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888f6fb82e2575a9b68e3b004a4338f3
SHA1f6bbdb3c8040281bf2e05d62a8fc8579df6d4739
SHA256508a85bfe80be45fb650d49a081bbfc74b494dd26944ab70ceb0a7fcf7be8047
SHA51258a7ec03cfe493fe344e98692b8d2231271e32843d3d2036dc3e585af32815056e0fff785da785bc6bbc9ce0a5ea1ef50cf5b599425fe905e93593e17cf5d438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa489936948bbda5bed4b149435a2b74
SHA13cde01008d754a24dcfbb8f4065cc74f1c738f71
SHA2562d2cea6bdb0d5ac8e6e0b27a136e1820c5224fd8cbb18c1afc6c171b92ead042
SHA512f215b4a51c76306ae8dfee5c2e0f1c11140cffc2308a87c95d7f1dd580c053406fbef75ff901dff21e91b38311282858f1065367964d102e4c431a16be30f324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115e925c44e19c029550c76516f82e84
SHA14e9cdb6ad12e6c3f3ccffc1d940c092102c3a5f2
SHA256c93c4cc63cb5e8a0031f0a3b3333b0849be990e9605d8b430eb6e127d3d6f6e4
SHA512a4919f3aa12042fc332e978ec47af6c276f1e91991973a998e11b8c7591dadec7d516e192ef0669c17c9040a636d9b90299d82b691c5568e5416ae04e7201b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a7e0ed10dd32d117d4c18bf29e6c90d
SHA144e74e48136dc3388dd74569daf1f81d2f011fff
SHA256eaee15224fa7cc5b589516b81f3adf8c30944c12c4b849ecace1c5d753265d73
SHA512486969df8309c9ba52f106956b60e643e4935b075a26838a17d05e09fa2ab3c2aeeef7dac7806f79263fccf63833387233f6b1f328672cb7c19db08294809daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6789f93799ade3cb332b0dfde5abeb6
SHA12f1fbf0c922a6201821ca9d71676b8dccefb8fa8
SHA256e8370f7fcab9c59d6a62c999d2b5a072e97b87e4a2fa82dfbe37fb7d24da157b
SHA512cb23af04b885bd91fe428416af32134b35cd8c56aeed1a8fc069825888a3a4f37d592b18e04c16e30057052017fb8720beef0c4f9e8899b73f061bfb4f58170b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e0d2f7fd9574e1298cfe5c759d6408
SHA14075a03bf65ac9aee5fa43fab56068a3bacae62b
SHA256d6bb3af9754824b1ba2afce1d1326ab75d8badd8ff6e056366e06048025c0cda
SHA512c6e837a23a7f4aaf910394191e19c458dd751a6a3462a57cfc942906d74d09a823c06df1fd79aa64b3e22daec7f2f44e2301edfd6db77f3cfd8e7cfcb201a961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b7ebd739cc61aa2edd041e4f449b903
SHA1b473d1a2a5366fa1bed16aadac47ebafa0c8513b
SHA256de8b18d63f5b0cea509b8dab9735f9d41dac8972dd305fc76cc3477d531a8d06
SHA5127f37aee8466eb24225f17110fd2c10379e98eb65f4d8dfff9dc430fe3ced92fa5671de0718ae233dd96f30280036dc11ebb941e824172dc39e8166237bf1e505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5937d547afd2c6f9cf9352ebb8f76480d
SHA1e4b7715e7de841d70cce874caca41bceaf38d691
SHA256243f9a39d337769236b7a85f313c115920035a8d8f6049c873949f22c8598df8
SHA51261e8648aeb057c8fe9801bb03529631e85279fb721bf9459a3c4d7065d196a6d6536d22461638fb045b64c1d0ce135623f1fa8fa15283d6ea4e849834da18567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7af75ec372900705331164b9cf021b6
SHA1dccab192badf344bae12bd2c8ee734ef5468b05f
SHA2569d1e363b647486e72b0e2062e4d55e24a03a5b77898c0b609437bd109ff87ce5
SHA5123d7b75c21ea2561e89bb1d1b45802246cd35824b7b04ed2fdb831af24f4e39a2e80467f5bbea93092dbb4e4fe16834b04d75995a3d8855d79e1b5a8cea2b79a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b008782374278ff61fe877625e507722
SHA1772a652b5a3f2bdd46ca99520c16a684a1dd6d44
SHA2566ad8423de996521616112b5b98a1fdb92ebfe64643a7ac5d9af366812be8b55f
SHA512546da1e75a05bfbb4c37580a592dc37c1effb9ccfcbd36b56ed91bc0a25d6a0d3b55a458c9543bf3b9cc632b9b333e20e5dc007eebd9befd33c194ecf922b082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c39fe54a00f6e68d63ac321ab733f4ac
SHA1a78f1e86bf411d11051716027054e531938895e4
SHA256f7c9016a5c5f160c025b6fc0df2e45713e4f6eca0945ea8d9360202027fca818
SHA51204dd306b972b5af7a5701e12c420b723385ead0f074599d9418b3d322665e8ce6610f1aae4d84d9e24b1c82add9378a1bec671f42f1368618e7020738b7a0e09
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a