Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
68bd3ae779944a27cd0aa48aff54c83e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68bd3ae779944a27cd0aa48aff54c83e_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
68bd3ae779944a27cd0aa48aff54c83e_JaffaCakes118.html
-
Size
3KB
-
MD5
68bd3ae779944a27cd0aa48aff54c83e
-
SHA1
9844385f344552b16028a963b3ebdf2b1c6c37cc
-
SHA256
36a85168cfd63510ea4164ee8d504eddcadbafbfc64beaf7c2d86d7dff1ba222
-
SHA512
c94ecc4bc87b10c8d9a7bcd7cc85b92703042bcbcfaba826fe0a769a50198bd23cf830a05644355453efdce7ef8f017b119cca52b8053f77f8b8bfe934805461
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000041717e64e9ff3bb59fb38b23a39fc28ee6ba846a796cbf945c9aafbcef3badc6000000000e800000000200002000000092911e0af37d60c237bc999fd7a16b234e21d930e5d675494b8be3e835bd450320000000099169bd276e15551ece61fef994964d6fe6f1ba77570b9a7805e4f58e79d09440000000df2d27753258978f8ef473e9b9038af32ddab1037e5ae599f519c97ebdb888e8279909099d685bd079a9f99b0f9cf468297e4032b59486b92cfe317793ee4396 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09b0b4e91acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7965C871-1884-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2244 iexplore.exe 2244 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2080 2244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68bd3ae779944a27cd0aa48aff54c83e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584f2850b7c2fef79943f2e60e8d62e02
SHA1cf1ce4bd9a51045d7f796ab2492a8f659dfc7712
SHA256f578c906d392667f2509024f1c025e76305a99b2331b6f11eb7119281ea4ea2c
SHA512a91cc9a49951c6bd63f71522348f2f9b8398e0e273ba15e1afba119a5a795e9c6ef0fa6202487bc4290143d8eb7e1193309fd306de6168a060fe21bd8f7e4a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966292dcfa6b019078e9029c2d4eebda
SHA1b37ab98c0c8ed6c6c2302238526dff0a408e2eec
SHA25666825196e6b13597742b3e1ff78ae18711cfe61b56ae7a6910cc094323f466fe
SHA51263184a225ef34d4102e2d10b9c8ebc16e157698936eec50b0ec5ca44a0dacb8517b84a3663dd797ee34390f3e1239ea0195613fa758814a141163f655d451b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c09149df5585a3288c76e8478574558e
SHA148eda7ed0ceae155f904227f2b9bab1a67706823
SHA25673b59cff1ac0c55613fa185312049a285da1e8c124d49332f4f5cdbd416ad5dd
SHA512bb07b0a9f512b22bc5c9bbc13ea2c367af12fced422bbeabb7f1f6ad28b10f10f33cc84cd7a83c72c2024d9d420eb58dc29cd86183238d199e63c8f2b5ad4068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ca71886203b0ec42abcc18cf7066163
SHA1b690de5cef12bca0492a1c7c54aa85b562035529
SHA256334d7b4aa6a10af47c1da8db0180ff54c96bfaf48261329d350300549c8b4a97
SHA5121d4a5dc39a39e3d407f4b276ce5e8e6aaf15e09dd767982c27e56b400a3cf095bd14850a7035d4e2ed8b89390f325b066047030911b9cdaf0a90d3e2b38d126a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522760cd2f73c9fc35cc81d615bf6161
SHA169c08a8522dbd549f47d654633a34dc54171ba46
SHA25607e775e053e1caaf18fc2474e1f59312e295a33b7fbf412c6c37502a134c52dc
SHA51267b5d1aec8d5ce48e6da062e7b66d03955477387e353ee705ddf054869b9f4b59d40a9ab80ac81682930cdedae23b8ef3017ca3834d91c80a46bbb84511bc758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5530c0b45b2c2a73bd441f7ec1b31b450
SHA126373029688d0c30a9e94e8b19284ae5419d8b35
SHA256eebc22b6d70c33f272811a3da4165d6978e80bf2869c76016e9cfd36a6a68488
SHA512848c0bdb504335c05618dab5080005285b48b2be517e996f529b6110ebdb9c3321913c2abd2bf4f1f580a2f46cdd642a70b0476de13d0cadb478beebdcfc018c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146f11e208ac6810ae23449c59c96f69
SHA1826872911b736d2fe47780d5dbf63a7484af25be
SHA25645ae1a4fd3d0a580c4a6f4055e75e3289b3cc5569a2cbf651aeee69626444a66
SHA512275dc2c6713ef4af95db8b79755e3c1e45a175ba65c5c5c20e7bcea7fdd7cf42796b93fc6f6a78af243ef15e3383a12fd6b4857fe8f54446c9176cece7061a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533a7ca84263b468c9a8306b28d58baf8
SHA1d52c200fe88a42d7b3071a2b119e4b882af615ff
SHA256ad8075626039c4fc851f4c266082540c2cdd2df03780c747b19ab64a6c366dc5
SHA512ffcf7c12e66c9a454c1bfa4390d2259e2ff39fc1805262220bbd16d21b8d96fd82fc9252547553245ca33dbe435cd147e5c7ba5934b1db5b82c6b5ae113f1f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5231c090b2265421d64f95a6050632603
SHA1679e5d9fd7c64bdc95b59073dfabcede122a1f34
SHA25646bb8b97502adab3e8df92bd2ff3706e8746e2521690d011c107d7f1d8117c43
SHA51225ad0d6ee8e0a458b322c0905228c86f85432c4dd167f2120a44e7e32a4e9e61d428756d2bcf66f02ec0ff145abe2d2cbc24d3aa347bc135ae544361bdf1f897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5dad3cdfc3ac083eb1a845a9fdd2ab9
SHA1e3b8131e5775d642228850997b922473a73b2d24
SHA256db2df409b0af35902d92ead5f068b1bd9bcc0390034c2bd9d31ee743966301d5
SHA5124459ad7ad4c8c6c808fff9368fea7986a1c29c112235510de734b485d68c6ba850f8ad0c51d0e48b577ccd2abbccd4e5ee0677c987cf03199dbde6412cb1aec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5511c3219cefce1259dac3b1bbcd87028
SHA1aa65ef9a56cc7234fcda26d9bd3c74bb34151bd5
SHA2565cc28b59d1ddd435a9f205fd21e36e769f44bfd0d08aede65cc74d00cc790dd5
SHA512b26f5493e1e84aeb71af532fa2502b8401e3a8f45898ab7f845df4ea4aa9a9292845acbc90bf040a767a6893a355d4c89a3130af2377014db4ece264705db760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6139f7421935fd9427c36dfa8a8a46
SHA1a097885cc84fe99fc1423fe1600979cd5e710852
SHA25643e10e916da8b385333ea800675741ca646025b1402c3c4e7756bdb6a094baba
SHA51213ad389b0d888cd22ed20d35f268cdfe06285c2da89d462fb221400cd15594a2f0d69e61ffb6e331eb37afb63a3effe20df9f7d0315d4b0c2604b757a9e46e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555a303aad6db789f2e3ebf52558bfa38
SHA1043e5ebe94e19287016bd98df6bb68243ca914cf
SHA2565a80fc3b73b4e508f463c4a1a8a49f3f280c5992ca4d1994038acf25d81f300e
SHA512f62ce4ffbf8a2a390b2dcacc4683a8bedfd126bca994638a01427809d723c1e8d964f3f6b964d0c605085d97a0e3b110ad6c06ad3c4f900746bc6c5f10a10261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e2bb3e27fbf92c2710449d98c02cd8
SHA16930fc8765bd5453123ca24b634d032d566d63aa
SHA2563dbe92099b60e83f3cb23f6357c7b8ec0cfadfdb8dcd4b0063471ddb6953efb6
SHA512e308d001491fa711154faf03a873d4c5a7f38eaeb9355f9f7a4866d9c75172a2b11402cd5eab50682f6f52a0867ef055c8327d36b9d3bc22344ef10192170f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db6c5d345a9d1b459676bf2ffd0da41
SHA14971a9a81f597da72038b605cd90f4df0bbce7cd
SHA25607b93572b163a5077907c2be5badf2aada56c6fb4de2a4520c5557e109bb0b47
SHA512cd009e0bffa2f595c76119f7828e5b7bb65bf041274fa12eface75f65e76addb2e6d467a7045c16d024c79627285aabcac236bc5537e93beeafb02f0ca8a66d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e0299a580c3ce7190cc14f74f0a8ed7
SHA16e1a83d02d192b8ce8c15550c3da849e43e241d2
SHA256a2af997c08fe3d32080d8570850e3d2b21fb74f9c8e9b192107400d3f30e8b00
SHA51203916c5e2c6f0f9c87ee5e815c2dda9bfc43d6de9fb7d1941e6118d1735918147ec1822d444526bdba8e8f5393d7674219d7e110052668366f526895e4782009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55664601a59104ac85537536be951e9ae
SHA136025accd49ade2c53e6f985d2bba60fbe181641
SHA25607da95de8df459b1204b982cf6a1003217c40458d870163684c6908503373f52
SHA5129369734f2d7ced83dbe83111f9f1c76699c1d9d577e0e2feff5d23349c5852345c51ed18bb2c93648d21e15e4633fe0b6eadd3b50fa767525a20015af7d79354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4f00cd9e6ad6c815e1e1b4ecef037e
SHA11c6452ed57ca89259117a38f424a392e8929592e
SHA256edb55a87e0aa68a21931e4ea9ec9230bc5ca6d45f9666b7ba8f37792b41d7ac9
SHA512788b1960c7bf7d77d360bb4702977c16f40147169603923187ac93d1a00c7e9670713b86c30b1a95aa94fe965eb709134e516a54bd651f4ed4bc5cdf48bef6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552bcb71a32d5ee2ce7b91736a9340f70
SHA189187e54c9611b7ef55db82dccf960ccaa550cbd
SHA256b5473d7efb4d7b8b1e5e6c3776094db5141c3c36e98068c8b6c366d386fdefcf
SHA512dad3fdf483a782d2ecf5169a5a24bf3de015cbe3b917798b70f526985e2b5081e81c7c2c9896ac0b041e3a59aea70d0f9970c280c6f5ac208dc2f47b85242708
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a