Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
68c35ef17b2eadf530b3a37eb2b664db_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68c35ef17b2eadf530b3a37eb2b664db_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68c35ef17b2eadf530b3a37eb2b664db_JaffaCakes118.html
-
Size
27KB
-
MD5
68c35ef17b2eadf530b3a37eb2b664db
-
SHA1
0b834737a05e895065a3d272216f55c27ff1bc63
-
SHA256
6dcef880c9e810c2a44e4aa1a7acc40474c128c18c05cb9d754db6c2d15d482d
-
SHA512
a9e13c9ec5731cefd8e745b199c704986e2ec268c8f94ecda81b216f4b34550cbed68a0f7e595341265fdf6961802cd20502f730c4bf3ff5b3901a15ec0927d4
-
SSDEEP
768:StO1CQCcCcCsCsCFCFCzCzCGazKYEHmFd:StO1x//HHYYmmdazKY9
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007e53100927865938c88fc2f30e9a548c69a68f2684043b34a99e19c5cdebd336000000000e80000000020000200000001888a869e437f752e3ebfd6c9158eded25281e82fdbc83e8fb9b314374aba426200000004094a01f45ab0deb0f1da84b327017327edeb43e8ad6bf279c8f9c4e543fb4cd40000000f642984b8a836ea5f0c175f338951a805906392f6c8d42c4914841221c637dd35ba42ff652a94a26acd2c02dda049c58422dbd4507038b834a90c70913653dc8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576770" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600b9ec692acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F17E4CF1-1885-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2548 iexplore.exe 2548 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2548 wrote to memory of 2412 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2412 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2412 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2412 2548 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68c35ef17b2eadf530b3a37eb2b664db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a3abac2e73587d1df956be762dfa7f
SHA1fea20c534563338452989e15a9a486ea9b10df86
SHA2562906688be11c8378044a318ee54904b17d4f32ac3b11a9ae1a69a47c7a5c8b31
SHA5127b8aebe57f2fd030d14ffd2ea83d0b2685c4b46029582d2027584128821a8f3e6bc1cb4b5becc0c1f867bbf097fdc238816d4d8812ce9627c0658422ac691ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2acfbb142d04645c1a44948e264fb4d
SHA17e1a568d2c24474c379d492781c3974486a53754
SHA256b94ee5c67b0e8a8a85d5a62acd5f57f43ff5c9da83cbd75df81245db15cae505
SHA512c4ab8827237d1503b5caf23df511295e50de4b0182511dd6db7623102dd7e3ce429d148ab23f669f23a564f52280d5314b6269fed2c21396ec39f64baba0fbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a3cd2a0de15e939d7dc69995ea278e2
SHA149e593e5f0cd77796ccb0f91766a296c8f3b8f7c
SHA256413c6d7c22613c2dff0432016442d03de7cc3298fd9b640d2a1b598311f4f594
SHA512d5fb3f8a3eadbcb29fdb3d70be33b1bd521754a703f522823278aa896825871aa647f6fec7f2f5d8cf9a333b962064c947cbb195b8588f579d42bdf9baf8b490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1edf62c550aeb2bfbdfce57f1fd2515
SHA12e35520f5e20644840a56648fed6b8a31beed5a5
SHA25677b1e818dea229a8d5fce2a32227f3e492480288b7d04790ff657fd6a5a4a932
SHA5124259340794d06300a0761183b4186d665f28e93df815a32ed13270e49d289f3e4895e23908cc2bd13d5d11fe0e7bc92a52b35c707f2da1d2476e17de5c6b5afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebc69541d1e0e434a7c86386b6f84333
SHA13866068cf96683bacddc4b429a621ccb600f6aac
SHA256f296c29d4ca4bd5cee267255bfcca9071982a60f4c4ab341287c7d1eccf47323
SHA512fd8a2081196f7eb35e67c5acfeca6edfe9ff36da289b612b180d7327be1c42fd735221c5d9d67e666cea98e013d7687800e689a6903a2aa771aa3e5279d7d15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5526076f3d9ea3f47837540ac6ed94286
SHA1b5163b7c0f74b4ff6040a7185a5410356e3c636d
SHA2560d91a58a46310c956d53f3182d3bd0d925b9671ee85afc62a14c2d771621e9a2
SHA51291722112364c0a88bae8becbf501a36b6be62131ac52eb5bedaad2093f98e68f9e84d016864a538d747ebaf0f3db50182d5273285f7357b890e718fe42d181c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502af847dbc4c024bee0308e2b1b3aebd
SHA17e3a02880d1152eb2b1ad7d8c8cf6b2b561a5edc
SHA2564a44fa3d36a14ed614b34d6facc952017c2b234497523cf9063207d9fdd3a241
SHA512e2e4e494cdbb69d1d7fbcb0b64e0034062261e2491615e3029280ea6079ad48a8054ac51547ac3e48bf67792c1b43a910088e45bff6b88bbbe76b753e56de933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc765e145af0c862e31b528377ec47a
SHA1d652b02e61ca70c8e0b841b0c1c147f215af0173
SHA256eeff22926f884e77382dc32d096f2be8cd528276084569fe792aeae3c8dbf069
SHA5126ffdeae8c988ea3ebfbf33de7f4d1e19d97975a02c71c828d0ba756bf4ab81ad0ed52b86c9ef74b75ee4071cd1cb6c9961c04725457ecb2ca8d8d267c37444e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbf36f2f8c8e84ccc7214632a83951e2
SHA13e44cd1c36da96e725d82cb62514231673681d71
SHA256885987c58c67976f5852b88a987ceff97f37141cf8ddf30bd3f5afcee7672e27
SHA5123216900deacd0a8dd84fc72d6520793c837a58bb43c4a742ab3ca5e6aa2674683f7d9bf988c72499bc2ac0a1eace3ec79575372ad7b2583f7183be060b1abede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b9ae2bf538cb2c00840cf27d04354e
SHA1d1c358d5c85e19d777d3de507584a2996406d6e4
SHA2569e2b913dec06aee5dff7e5c1211e0573b66356794796cae50cbef9832cc47fc0
SHA51215c0b851c31a47b088ff2f47c37e23aeb3183cb0a2cd8879271dae43375cb017de4eb1d3b9458d80fec68ce17b3f3705a37d64158656336c57e7692ca647c3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0b076bb76b0557e0221ea5cf2e034b7
SHA172a768073a7cbd04325cca61b591b30d5a2a1ded
SHA25640be779f33850d6e14cf4f44b8aa3abada3a6625b91a80356b06696bf172fa2a
SHA512131f1a1ae667b11d40394859a94609110cb973c1142e0cdbaf6cc78c77013f2f2250fd35f71144fbc87545a42dea7f0732b8022e9e6337bfc7e36faf5e9b0ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4bf64a1629df00ed1bca81c1a086f41
SHA16bdd442cb76d9a13f72f1d60f54efe6ecf3ef4c7
SHA2565838bcf8879292b95f5abd0c6144fea83bb2a3a46a1d93a8263bc845ef771aaa
SHA5126c0434d3681f2d5b2c5503c4d1a4ce781cd59c9a4fd4dd4fed1520a59a038fa9f43a6c44b24227b61c3a8e2e96699f6af723fc00238cf5629e94b51a1c0e2642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b92309137d1d3fd7bd2a3fa38fc8ed5
SHA1ddb061b521ed9ff2a799f2c69d0e413d5060e83e
SHA256e654db13b31dbc3453eeac33e99c8898bc0703b67cda08f14a729d4fb20deb84
SHA5125ca004163772f9e74807e1724f235cc3e8f4474365884d84aee3d3e881584b6206659f6a8ad51c1d60ff15724cd2b26fa5758e5413bcede779980d1cecf183b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e81666b27bc43c89477763f24b0f363
SHA1967586c29ea0f95d8c834a664731e4655d8db055
SHA25692970ed8101fee42bd0b3be2fd723d3b25c33a24b5b49325c94e3724d07e8c42
SHA5125fa23544f99b9ce3d1c8a9eb89e8f951ef43d3bb236b97d922498f8d90ff448f15ea092a350091fa78ccb5b04d8b74285cb035972cdab43604cfb648a2892de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587535a38bd37962e62a664639f057ba1
SHA14e163fb845165ea1c6e497999b3ebb56ffeafcd7
SHA2568f70474dde8f2a04452438948d0f021d7d7080fa2c8d4da31b9fe85a823ecc0c
SHA5129d9e99cc56c065e7262987b08302f9535ddb4f8bba6f58a62eda3a1cba760fbc95686aabd31b9cc80c3c431966eb94c0798e4dfc6868b603a0f391dba5479d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a41af0c6c79272f0c19b5f75dee567
SHA10bcf31ad0ce30f3ca7ea1d8b01afa46e2879a1d5
SHA256fcb730c9ae52484c78aa927609b43634e1572a669110c8bdd442276ac162ee57
SHA512957bf09d24d48d3c6ef3d0e0350888512efa717cc7ee01a1179c1f3f2e9827eba30f6b61d39018243438edc9a3b8eb85547c8507104e7f874022e3c6344b1708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57612bda086989a40dbaee28c875d0fe2
SHA16bb395b994839ce0dc01ae25329cf40b6e2e5e89
SHA256878f031b4695a9e02641da8e794d36d595464f0ac1932951aacafc32f32e4b59
SHA512bc9f5efb93056e599dc5f68928bc2d19ac14e9a805264eaa7dc5e392b1d862cc6fd7fb843de48acadd5ff1579c137159d0bda61b9cfd9dbe05b392fae1c78306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0a01e9d4d80534c040a897455b3883
SHA15dd41c3ad0b405bd3652266009a7ec2b3b94ee18
SHA256bffaa4a6ea2361f12c464064fba7cc5bb6e90e50fe0133ef304e918f95a77f12
SHA512b37837d8dbc0dbebab63fa997c186ed18358d285ee771ddc21bb0e550c93c055292c3872f1487f560b2b6fba40486f1123616b48f0211507aa7f9e8f642e10b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa4a242f3bfe9841226006a50e2bb552
SHA1ec7c28acb944cac7b56b71a48d28767cfb3e4031
SHA2566c15ea5209d2b3ec05eb07828eb5d7740f487e6925d72cbf6fd8f1c137b32cec
SHA512807f9b8697345afe29f1593e04c9434437fa059ee5e8a2774598582739adb601bd05d1a10408feb5bd537480dc24f3028137401555f8f051d1cfb1479aebd219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569053016642f5a16f0e662e2fcdda32b
SHA174e014e6c38512ee8f5cb25d8b0a48fbf9f7a9ad
SHA2564ff47a26e9fe2bbe6864546163f87f78a0d5633bc1aa579343846c1b600b10d3
SHA512260abab9b8dbde66493c8422a6b9feb94993fd0dde7261d6324bdbe9ca48fe881b6f19e75ce0672e59442367293e155160089bb8798a6a3c85f069232a743403
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a