Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
68bd8cce85b3624b39c6a77c07d18019_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68bd8cce85b3624b39c6a77c07d18019_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68bd8cce85b3624b39c6a77c07d18019_JaffaCakes118.html
-
Size
254B
-
MD5
68bd8cce85b3624b39c6a77c07d18019
-
SHA1
130a47c2b4499d459e8348e26ea408a16622e910
-
SHA256
705b450853c0d47161211d0b1aa187e06b3ea2e8765226dc973b525a3190635e
-
SHA512
e9be426b58e298616ae1d42be2389bf081d1d3302ee74dc940deb1840731b822057e844e4e47565fa479145178d5a6fd52d540c7c63c420a9a1beca884792168
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576166" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88E5EC31-1884-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9001745d91acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000390eccf066a6e74d95cb4ae9674e295d00000000020000000000106600000001000020000000a02396f83f54f044b109e13bc90570089a43f9f23c1f5c23bd7fc94b5a4f1f08000000000e8000000002000020000000632e9b103660acb4c947e4e3b046ae5755e7a19ec8ed08a07dc7b617cc62089f20000000e6056be42ee5f61b20f53fb699cd4ace0184a8374908e8f1d76fe0960ae1602640000000461547b38ef1c7845d4d098e34077d4c6aa0c1e7606a89eb15919f704d3a26486874b32b5aec222d8052f58d08b13c2326fb03c4ce7fbbd0d2694c2fd3a86644 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2740 iexplore.exe 2740 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2740 wrote to memory of 2200 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 2200 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 2200 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 2200 2740 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68bd8cce85b3624b39c6a77c07d18019_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525c81dc9be989e67e4aa7cb34eb57f4a
SHA12a5b531386555c3642442c18126d72065798b0bf
SHA256e9413a1fbcda327cef45a5bef8ed0f2221048312c82668453fbcd46fa77d3e6a
SHA51210d13f15388329be90be9524224f7d21ee60d36cb7fa5aac6e8e13de074074839bd1b4403819f106cde844bb8cedd4c88020b06af08e6d1dacf220b6bf6f4186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435a0a7fd8bf62fc1480f7c924d645c0
SHA169a078c7aa09171c3ed32eb1ae14a32319bd2595
SHA256a14a3e07385aa779234482c55ceeb072191ecb2a8466afb19eb1d2ba006653ea
SHA51275ba9e05b903dac12b47d567dc1b4f3a1fdbd88c056f1f41f2809a39d1981890fc401b773844dadfdd0027a9a903743aa05dafd628d3666133065b1805c791b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6512e3cec548e473729577a0748c89
SHA157aae173b8f1d90c411ee3fefeb626b3965bb56f
SHA256e0e3957ee58a9d53c857fb4a4bb7d6004ad500e64e7eaded48e7b58fde9b2c58
SHA512300e0ce450d95c203c053fa8dbad88fcb6295932aa01c23b617e8900ec2f96ab84acd2380e1f85b7e6e1e33eea7f4a823624dbe847e5431e176bf88fab3fd0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8fb406ee8c683b9ccef07c04dee865
SHA13f3faf3be4e8de8d67996fb779acba932f721078
SHA25630bfa199b0c504b719e8ab4876b5127779a283ed296ef2bbcf4606a96ce5dd1d
SHA512f3017aa00917142006c900e06c1fb0aca7849c42a991cdad880743bfab218ada2703a3a7c304bc3fb05ac028e21b99de8e8d24cffa19805d8d04148d61d1dd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7f5bb58b18b2742be2d2ae979aa6a5f
SHA1c79b728284c9eb70a1b861f89e3fe0a5848d56f3
SHA2569d596c2c8fa0aade16cbf3416afd4943994d8a85288ecc34e16da57ad8cc0dd7
SHA51289e314db1f0523d8bd7a49ab29060dda56e493072505ba6c840c3fdeb6f99fa94cfc17b0a404dbdc83f673a7d27568f7e8eb93774601a90feef5ec53566bb9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51887d38788f9f20cc58995d79027964c
SHA1f708943766117b25e038d1cf164eb86c421b8a30
SHA256f3ad30cd972d23e6bb6b8d2f413f432f7d2809b3b2f8d865b5144644d6fce87c
SHA51222227705e195d26f78cf982f00ceb69bf8ad57b7bddc6b7b457fa5a46a8081bf09fed5060437d244677f91fef285f9e086a4df51063ff1fcca6bcffa43757458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc281e4f79e4ea359c6caa77af5c513
SHA124368eae9b2c502990b40364cc6973022322b93a
SHA2562f8b9dea2b1f2f3b9c210a3c520757b61d10cca25959e0f655a95dd0577e7f57
SHA512c07376d65bc5c1a7777f4e64cdf3504532a0314f1a3300c36fbb82bffd364dc3d4abf9204cc3716cb0b28b394c3ee0d930220f44e65b51a8d6a0b78c831862bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8df3a4349497952d7555f95f4e4b78
SHA11d11f5a05d0a12c51986bcdc24fe2408cb7e6ee4
SHA256e86b8dcaded6e53c1bed9119fa4a605ecb48fb37de2512926d556af2050e53c5
SHA51201fa2f5b1d4b7e9f96be72c0ad2a39823f24b4f40fbdba8cbffe142389970a450952a7a89d56ef43e5a9aca5ac3e2ec21abce4b38329eef86166faf41c413c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f68cf5895f00ee7fa38f1897e057eb1
SHA14893d71ebd632c68b53c4b1282114920ba0a7992
SHA25642103482fd73ca73f1d2ef4bf3ee7cb3f49318b610beebb6e4c29344586c99c8
SHA512d9f5772295fea3fcaa4d44a3dc8f2352e4d9bab57bd44ea4d08f0ac39e4ab316e485214b2f81a6e5fe4f690085841a8013b9c653de6806fbd0fe115b9d1210ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549c680cf01d858a6a46bed9a0b99b484
SHA1a2340fca7d718aeac6909f6a8ae5437f94da6f72
SHA256d89b2e5448c3776992bf7cac250b08ec171bd66d58360308117b9e58f9853228
SHA512d43e39e83d7daa27a9a54f14c36b5429c36fad2adb6ed1bc512ba9370e1da7dd6644c826226d3788a4a05a93025c6f7a484784c64d697a979f5fd760d3818875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9975bc2689a80ac8bf62c4a99af6a5d
SHA141009c78152dc4d92850dbd0a08c024f5334d755
SHA256a9979e16c0c69f4808875c8605db655145bb5e7d57238019f7b8b31408ff3739
SHA512ea65f5c4b4914f070a861e2a86feeca246eda263e86cb4fd3002fdfe12ef3b5163caac50763a14ab05daa8ff6eaffe070cf408e95930eff659815b1e29bfb9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec48973b3b4d7078c726105d7a3644c
SHA1d9115628a86b10a505c6d7c2509eab35e3bcbd47
SHA2562cb7e813eedc5342fce3d83f12565a0e5f286a4f0f8d949fbe2a52ec87edd8b1
SHA512fad8c8faed358563eff6e7654e9824f231e77c36015c7686f237b43efda9aaa4ae0515179c8974905cae3f6c7eef2a01512ed3d3c9cf5344d8c23d66527fd6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca75bd9a2b241180acfed336fcd3be4
SHA1e13656e400f121baa48d96aee12aac771e89e47b
SHA2561b4b7b3c30b47c3f3ef91ccfacc26965bc065e07db5ac82e21a8e47368687cb6
SHA51209d3d9833b6f420c81da4114aac218fca897aee2155a40014acfed32a14e684c701524c0d2491c2bd156ead660844a7fc6a97382ea7f0ff913e554c01323b8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543c1a1f3c742972c933d2a7ece299a62
SHA1d1097b8f61d6943e9cb3d1ceed0e6aa70c386f73
SHA256a0eee895ea933ba70e21189d12ff4660a058b77ced72efb17b296144a49e5705
SHA51269534407b6b74d61e2fc1db3096bc5dd05f48636b14bd1deecb88b4f65d3e8a8dda43eb6e1b62606633599142cb1fb8989ad9c67a3612c776d580d652c8dc9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552edf85134766e83c6990d8b6efa7158
SHA14ada2f4e8ff2f5b6089d7d1d90beea7c5cf36c3e
SHA256292b5d0fc32f50d92e3c3703a2afb03bd2e338a7df480455e6c0ae10f2044c6c
SHA51285644eea2f89f6038f45e229a4948b9df0bb909c80910a906039ded44edfdee66aeb28ee957e71630e374c5970f96b01e6410e06d6c870e621c3e7ea0983299c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b799e9fbe4744c16ef09f5473f05118
SHA1689cc810e943de65e11904f102a1f28f4a644b0c
SHA256c4b2f75140d7b5dce669145224b8b7dfd53a9820488acc65db3f6b72a262f0f6
SHA51237738a534750fe75039ace2f9ef759d01500018b28a1d11b6ef7218f74ba5c6bce7d97eff307a802a923d3096d8bb727995df49a7cea34f4c124dbfe9ba68335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0d1a409ced07dd60d667d58b52054e
SHA18720b108557ff0c9aa8deaecd3cc2c547b5d23d0
SHA2562df024621af0484ac3a1e28489984843092d962f6709d61eed984e7fb57daaa7
SHA5123d74473d6d5ffafb6693041f671ffeaba1ed17de166f82ebd5d071390be4f288e9da9e8bdd763fa88d2524206b7bb72428adb71988bf6fbdbf0ac3de3e3b9f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5874f00fa660a456319c0164f7bc63e5c
SHA1fcdff18cf242202ccb0fcf01a0f741d1862c46f2
SHA25641a5a98a115b657d21e15c2b1007e7fa10c8fab49701335a0d5578e4c2def35d
SHA512221b27acb8bf0cb0c9bf9c8a62598c48705666f17dd802fc1b92a98fe9c9edb6c0ac2ef50129957988426e75e6efd5b90c99e2c23c408f571327e2a0b29392c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134f2a68f030e7d20981eb9fcbe601a2
SHA14f5b4d4dabf6f5af99cef128b419ba519934f63f
SHA2566a1620fa2c55662181106a3944578850d1ee50c896578bb21f810df104a41a30
SHA512c15895e5b2bab3e6ad28d16959ea1a28fdd0fd21c0eeeb4a9303b28b5b0d25b7186542f2a94ea98d214ed12de6cfcba21e5d16cd0d2655f8a99fdf217028e9b5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a