Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
68bd47f18cc0c0f22eb133ea191bbb6a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68bd47f18cc0c0f22eb133ea191bbb6a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68bd47f18cc0c0f22eb133ea191bbb6a_JaffaCakes118.html
-
Size
3KB
-
MD5
68bd47f18cc0c0f22eb133ea191bbb6a
-
SHA1
f34b99941d993250ee4d55f73fd3b37acd8368af
-
SHA256
61bb830c6e3e6e2d50972c67e183b12727e6807185562ddb983557494de6ddff
-
SHA512
3cfef6732cbdc678636566ce52aace34cf900976af010373dfdcf5589df4adf871ac80b63d8e3a71e461e4de827e82d1e2cb0d98f5bfadf20c4d87fddc8d45f6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F5CAB41-1884-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d34396dd96e074bbaed5f0e2b29fad100000000020000000000106600000001000020000000120a2bb4f153f25b29521c009506395c635d74aaf6486e0f1c253398b9559d86000000000e80000000020000200000002594a5d58148672fe697ed48aed3c7c0c67ce4828f1d7e33edf3d88b477b1b68200000009f6ee3d286f35fdfd0f4797102b1f71e82baa35ff2ae76b5c63bc28dbfc771e0400000003b21645d1a02df1d457b379eb35a13f194f090987e1ff3c85a7dce6d66cffee84926e80ffaf8a1fbca9703e8cd95b205c52bc17cb53dac1fdf96719397506b80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0513b5491acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2128 iexplore.exe 2128 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2128 wrote to memory of 1960 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 1960 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 1960 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 1960 2128 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68bd47f18cc0c0f22eb133ea191bbb6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a42f75f76182c679009944fd31f1851
SHA1e101f2bc7c6eebc6b2f2b4ec8e3e1047bc9a7a88
SHA2564c179aabd44402d2c1e03f9dfe443b76ec17da49fdfb7541d6073d0766fc8cda
SHA51205530ec8d9534fdea5eadbe1bc386f2e4e00b153407dfbf7aac98b6a4a9555bd811737953b51dbdd21929ff89bbae1028e45dd84ddcd238cde5e11952c418481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5009a85f332d32f338a29b0df0f528e2d
SHA13041de6a96ce663fd270a720baf8bb8d015fe3ff
SHA2564cc1d5e518a75b18b4d31770b41a84dcbb202393d2d40b6d224a0923537586fc
SHA51212b78f27564dbbf4724c534e6f0fe51b2cf11dfa5d1354247c005a83d7c1a8de5258366a398939da69ef9f2ee4e1f9dd6f92d1ec52cdd5862e8e1b52841255c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511095988fbcf070a8b34224b31536c83
SHA1b51fb60ab9a38a9b26537ddc6d375168165b9b18
SHA25647340865d82036f907c280eed2e106d24f5c608a98b5ccd3c317fd68c506d188
SHA512f2a3673c58ac8cfc077c9949d64ab8826f124540541fe2651d1fd0f74eba2ae0ccfee53e8d32c9af8cd804d25c4d673231632cdb550e692a34928343fa7083b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c7be2897db4f9b6c09cadcd6f65ef0
SHA1f27049737f716ece9653f3fb9d13a2485b0f09f2
SHA2566eeb5c60205b22afcb9765eeff7c17531dc456d8f53679e1e452bef7adb9dac6
SHA5128e40a020fd7bba7f829b35be4fe5a025d615c641a0b13e86d633453542860b1e82394692e9d8f59574dcf156712dd65920ec819ab8b1398cef6720332a56041c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589bdc6ad53cc63aa8286c2128fbc6bc8
SHA1d221c8a0d6371938188a09071ea32704c12fb9ca
SHA2565341712db24f57f36788320d62da0955494a3d607f24ac1f662c3259a95bb43b
SHA512985eb84041c026eac564cd662a95b1ba5e6fc4e06f5881cf94a2b84467fd3d5f5d5e84e38fef8a6d5f0909b21b1b277cda82fff4f165c7d3acf42f46e1b64cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b1a6827b25a08999b29779dc5729d46
SHA1cd8d621543b84ce65af35982f4c3ad648f5c48e6
SHA256f61a40f869684712b7a0c49c1afc32a6dabbb343247e660f22e19c0605b7c4e6
SHA512469882acd637d42f93a58314985f5bf59c617bd71dd0a7495b2d682abea6637958c730b6735b26fc25257b6bfbafbce1384b9037d678f33f1e03716fbe28c45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb73ad445c71a55c6cb773084d87ee4
SHA12da6100129f9b036d0250fe11ca4d20bd64a83a5
SHA2565f9455a5af4fb9d9eb3ec9f36e85bec16d8db6ec1140142f0d42044fedf78e81
SHA512b20fd1a46a8b7207c59cb50c689cbcf75c39b8ab7a6d4596e86ed1d1cc59cc79aa2e3d3b9eaa29a1db1d96babfd38fe6b31af1485370fdba79abde8edbe8ec4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566182ad0cd275ca112f9ddcbae4fe4ad
SHA1db5a0a137aaca54fb46eb39d3ae7bf05e4279df5
SHA25645e5338486b90418036ac82d04f4891b9999f864172f713866ca46a8586d806f
SHA512949a949b397a704ad6fb9368ae8c43022941366820b57e1c7f63b5aa3273020a6daecc4db4247f98e4ac7e17923d6b59fe27969dbfdc46519013a08edb2472c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c6c6641e3c4a759fe3b663a8da0d10
SHA1a2fea78237b4a174d9f09d7e8a67112bb90f6308
SHA2563ec8c942c84d843df5348ed375710a970257eb312d36e1278e783003cac22226
SHA512d2762701cb55e97688b882baa8e1f1498d9f36378def6c98aa35f7148e3a2f049c8cec0bda0a4bbd1eebb692621bb052e98cf531ad2ba256021b4117ad8a799e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb91b9eee3a03bfb7159151fad7c08de
SHA1e48af4dbbec03872815473369f64e0967f2a60ac
SHA2560b93a7cda2610ed3aa956441d9db6f68dee848abf70ee349f37fdb6ed266691d
SHA512cd1c0ef245bf61bf5af7d11958dd660b0d64934d0fa69a93d66d1a89656a362e6a72f95768f6e9ac98abd0cfcc2a915e1d9792b7ab6d2e2c1a8aafbc659ed0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573db9926cd21770acd64855fbe42026a
SHA174adb90edfd65eb78fc416978bd81f10c8ac9774
SHA2567ea2e099484b0102d4c5383b2c98a2cd4edf490b2d134a7fabfe1e1457b633ec
SHA5125b8bcfa19dd836bc924b7670d42b2b198c1603b378c4364d64798ac128eb92635e548ba4786740451475a2237ca70dec353e37499c590f434684d864f84cb7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b7983d4399ecded68c06c90fc5739f
SHA112395013944cbc640dda8014921856a12374f3dc
SHA256ae811710968cc5a0c54f1401482e0ce77368a2a5a0bd6ca7fa7310c9cd286977
SHA5127082e6a8f1329703f17e98ee65eab7e1f0708057732b1f7f327a7bdc61b4b3bd312e54449b91836a13562397f28c5ee654f8cff6923212e0bc9efda83f922479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5aab0fad45daf7cf7c0f3bf8c33e8b
SHA192de6b18566489dca185a7740acd162c0ddc3904
SHA25631f96a35eaaaf07b2a3617d774305102cb32553de2411aae029e0d4d967b47bd
SHA512beef2d45199ffcd508a8370094d30022de3cff298c4f38e692dd4f6dafa3dbe4ca34ca029e37068b03f8618bbe7e5038f857e8abe79ac9bf5217e58c3724168b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57944fce22bdf5d2c5fe0435931f9b730
SHA1d961fde5ba7de5209f21d49bc61ddad12820c296
SHA2564fdf6da9c201d3f9031edff6837eb239793e699f86a3e45c229f688136ee71c8
SHA5123013ee3bfdaaf40b38597f346b78ca4168244b24f43c4b275685eb8a7f5d0ae7eb67cb3018084506b932744cd22c54a4d1dcbb59480d722d3c67903707772ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da0075fd4b28e5e2ba71d22dd22ed64d
SHA13e7df06a09199e652c373afdd055773579e32ed2
SHA256d5ef9fd1fd84d5946937e8a4de0ec5049c56f1d94e8246a0d2b0bf420ce3a77c
SHA512eae771f7fba9f83965b01a28a42cf16b10e3ae6cfbe6128e598380895c5cb723f0ce8bb085a5dd5fc44e2532a1b02d94d231c6255233268b913a08ac00637189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511e25ed9831928a594c9160adab138f5
SHA12a7b965e97f2009a8f2af7debcb01448d4ab0dc7
SHA256e7627f0b707728effb396ea0ebaf08c675ed11819d9edd8135c7e51676452020
SHA512a6197bee7196ffa1743e39f624a8d513a00664258b7f0b492741bd899a63482f0fb200472f1b36aa2e94124282644d61cbb8f16cc8291ade28d21bba3702119f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c690e7fbaa32bca4d9497a6a9868ee8d
SHA186d4dd74a185721e3fb804b5ec4b4d96c1fcd158
SHA25690fbdcc5d862af336d82c556e9462e353c62e9d92c5d6893960a7337a85204c4
SHA512bd1af8ab0db3ffe41b306144df791dfc47373e0192a7648feff74f09074f56c9b33288b1319927fcc8c86a019f22698dc76b60f047878e009362e00c218afd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc6b40785cf4fd9da5a167e97bf36ef
SHA1f75522c9b0007f250782841979794fe8e673e4c9
SHA256257d73af7df2c722f98c71191dc231bc59838486532a9fba7c4f3cbe8c448732
SHA5122372d6acfb3e1a207f9d6c537bbf46d32e6ed423e59e2ad71340fda194643115b2a164beb86feb9670af46c36afcb46db7f8646feb1aeaa44332b383f77c56ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85b46e46cf0a3e6645c028392aaaf34
SHA16675f818535bdb64cd756c0a85686d64cf6d0acf
SHA2563febec5067d600a251ac7b1d72808fb621951d81ef6c0dc89b0e4b3ef771dec9
SHA512fd389fdcfbb55d5e684de5aefb20a81c4dcb949ff3da364aa355ff8dbb81383d0603d78b6e9d36f9f583d159ef93c77a90add39fd1f3f3fcdb54762dfb3bf1e9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a