Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:02
Static task
static1
Behavioral task
behavioral1
Sample
68f000492153fe319f5d4a4a804e7632_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68f000492153fe319f5d4a4a804e7632_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f000492153fe319f5d4a4a804e7632_JaffaCakes118.html
-
Size
19KB
-
MD5
68f000492153fe319f5d4a4a804e7632
-
SHA1
bea13c94dd5ead507366dc6cb6543a72679cc06d
-
SHA256
ba8d9c2deaecc85fa70ae2d14ca99e12653d9044e3d21eab43075dab5794330c
-
SHA512
af40c94e7e7e2c9dcfe4a04a68d8b22683a51c7c3e1ec4722205a345b9ec9f589043668c33464f947bd33ecce7351d2e1cd4f9c9735cbb555cc512bd1d9b00cb
-
SSDEEP
192:uw7+b5nWJnQjxn5Q/BnQiekNnznQOkEnt3LnQTbnxnQmSgHMBEqnYnQ59NnlnQVF:YQ/KqeLl
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C7EEA11-188F-11EF-B9A1-EE87AAC3DDB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e490502e72f154eb037f8e1351b58af00000000020000000000106600000001000020000000dc3c41f9dffdac4c65790dca230d2d2cb007a5ad669b8642d4debfaebf5133f6000000000e8000000002000020000000462d5833534d2b074af3f066374be2790acdf93496910efc9617fa458aa7c1fc200000009be4253555bc207de2fe168224fc622e6ef41a80344e5b94d3fa0a01732a2eab4000000083272cb655e0811d85e1a547a6cdc7cf0e25c02a903c2edf96baf2dc7e18b6ec6d34cbefbb4f059f40077a232524566a39c9d0703044b5db0ab4e1507fc86879 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a334319cacda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1420 iexplore.exe 1420 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1420 wrote to memory of 3004 1420 iexplore.exe IEXPLORE.EXE PID 1420 wrote to memory of 3004 1420 iexplore.exe IEXPLORE.EXE PID 1420 wrote to memory of 3004 1420 iexplore.exe IEXPLORE.EXE PID 1420 wrote to memory of 3004 1420 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f000492153fe319f5d4a4a804e7632_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD538bc2e537dbe972f5fd3d451097a01c2
SHA1d475cf8e444c4771cdcabc7c3c241e9591cc4376
SHA2564a97e45c75102e5eefc3c89e112f61574ecf21e6d2bf450deca0675747fb61e3
SHA512798d232b55faf276789ca0434e6bb4c4cf7535e1f7297bb81da30110cf87aa71533806419a2288b7de31c2dfba1a6922188a1b7fa6419d1bde7004bd393e4c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a3a230a8ce806ba0fdc72bda0044bc1
SHA13aabe8302d602eb8a0e3ea621b90b3edc6c2d110
SHA256653cab0a626e668e7a1dc249f80eacba302f211e759bc10786030514078cef81
SHA512a888205cb02b6ba2fdb4b1ff230c095fc9c11878586fb97feacc875d2bd976512316eb24a4e1056a4b5febcd68c797ac17ecdb641d6f060c62a42fa22b21e9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6dbf612a31cc9927a5a8c76b4e9aafa
SHA1bf3bc8f721724f21722d904f5483c1bc605e0959
SHA25668ffc3457a61d689c22836322d87e45550ed50c2440f4ba7ef67aaaf73190bbd
SHA512e1c25164173c841f10db5fe8a53bb9968d970245869a44051e1259210906ff9e92a8783d39241473ea7f61947617d5aeeba7317ea641b07799da8b0b4564b1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c14a0f69b1d8d857e536f4204f5257a
SHA1a358832ec7de90ed5b4980c5393b9ca3b48e2bb1
SHA256819b49bd896fa6453294255a9010117e0df1c62550fdc1545f70234517b00ce6
SHA512cd54696cb16f86bde278ee8e9f58fb7c31c1bf246cb0ba95415a87635eabc1882e21da71bb3b56604f75ec83a0e9f39d4acc2babfe513587b750c0bd6875b584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53031307560a54ee94ce06baaa5306d52
SHA1056a4950c2c5b5e125a57ed50bd4e9865f237d5e
SHA256a328cc124697a0104b607f5d95521de3ad1c20aab6e2ace7157d259448396761
SHA512eea18cd8c3df4be6e0542dcab8e82493d73fb2fa6c31eb2f30914e8c44ecc36a992940201bf00fa279000ed6b34714bf1922b6b0a096c8d27f0477bea966fa6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5694f52ca05394b21a827c35f0cc5efb2
SHA1c3ec97759b672dca561e9826f2bda1ded38c1cd3
SHA25632d26dbbc6423bdf38b82a2a426630e5cea3ae48fb3b7fc26cea6c186f09e5e4
SHA512a13a156b072d1aa080fddc7649516b9987c4f52ff4c46d19c49f55ec51e0ad063de1d39b3b745c33b69bfde2bd08a7df3c7859f134ffcdb7102cb46835996e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d2d79670a6851f946cc8b45be3cc11
SHA147d12e20379cf89b6d17aec487491e0722e48b71
SHA256bf12ec946d95eb135c6b53ceb78d008519431040925de40c982a7df7c1161967
SHA5121ecbdca840d1ed1e290aa35434b748e3cf4f6b466c76802cf45760eae462d404bf9cd58701825b92bed153c4af5a908c496eb922ef33e604dd413df019bd66a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0ea8a0b5d9d4e59e3a6c84532a58a19
SHA16bca50107091feac510973cfbcf4fc6d30265506
SHA2569412ecea1e9d93f1dc9a199d693c92aded0a26bb854a4e16c2b9fac4058495f9
SHA5121f0707771ab5646cf6ece28c9ff99b763747bdc732117ba13c9412488f4ecaf43829ee82c9c9806181059ac468c367dccd6ff5afb2eaa074be2574c2c78dde2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0f655ccce66fe96f628ecdc8b2f2418
SHA1265a298ba1ca462a9ccc2f17eac41f9b74db6988
SHA25633337fd8855cdfac902aa1ba0074b19d91920ce9448be2484d0365e09849dd47
SHA512ff91ddc7efcf88b8d8de80a28254a877b3b3557903831d58b99af97a04aa13c8f821d0bcad111730af4ad2fdbfdedef55f7f76d0bf932cfd26c4072f05d13447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d418b1dc336462387e0f330354c78f84
SHA1a78d91804a8967379e745b49fadd602a63160e24
SHA2566919bf05da4bffee81264a34961a244a48cfb56c5332a458cf2003772fcd5dac
SHA5126606b745d0ce3bbd5339c01b74f6870225ef06ee6e9d5a43d12c0f390f7187904f39b3835c7f946906ec42c5fc1d0e9ba18edfc8e3ffdc0179bf88c0d81b9611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170ffd1410bd0fcce294cac7fd51c79f
SHA1f1e3379b45060e4e49669c39071d585824190e5a
SHA256d770b45b44398a8224df86369c9381b596aa030333f89e370a544b4357d150d6
SHA51249ae3ac742bae13cde38019b17898fbbfa2d119510973726a6baab581f15aa11e0641555b40f5c04f65040e09d16a201f95058e4372fd33d5a8b445defb376c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe3da517be87686237b6f5e24b217cb0
SHA1767ec64d97489a3c090bd2ee84a12779a2c206f3
SHA25648294a7cc4c71f5dd85b40f08498be1cfdc46d5204bd7be8ac617e020f6344cd
SHA51217466293967d4ca2dbaa72613d8ec5eff0cb05695e2fac80862cebcb6c5b1bf03e95e353a70dbeb0261de0ac1ed63be8e5c326f0942e128a81ba10a05724967e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7ca70926fc8ba198cacea71a243e69
SHA1db9db5290352e6603885dc8aae60cc307673d8b9
SHA2562ab1d4d53ddd04a0ab78324421a3571f4eb544a569a79af93e05494930fb7220
SHA512a629354807a33e77d25c4eda37385e6e72f8ebaa0cc8ac39f0477a3ee6265109b1a13e514c957755584d5fc387a38e2ac5187ceaa6e25283f8d704dca15d3566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52743d15b12cbb945200bc88efe31e813
SHA12ed01f64ab1232f71a12a5519d0131fa5fcdd545
SHA2562c4a646eb2933de6e7f04f4372006ec8220b0a85199e0bb70efd7815116741d1
SHA51295ac298e37e25838f91a1c5d8cd112118f8cc853fcdc19c162a92721ab80c3ec98888d023362c65fef14a626ac604d893b135d741f2ffef8f55786f72dfeeee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a