Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
68f0cc5d03b325a1bb8fc2e2cf3876be_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68f0cc5d03b325a1bb8fc2e2cf3876be_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f0cc5d03b325a1bb8fc2e2cf3876be_JaffaCakes118.html
-
Size
75KB
-
MD5
68f0cc5d03b325a1bb8fc2e2cf3876be
-
SHA1
cb7cf20dd764c0f546a2bbafe9b7a740af38e53f
-
SHA256
4fddf2c6df24f0027b4ba570e90d84097a55479c2fec04fd03d9e270f443fb68
-
SHA512
9a9b830e0c04dd486070292f196235b88f94e39f85a46e54ef63d5d247b29e763bd2b6e084b3bd915843c6d2c06eeadfad46cf553ffc74ebfac6de07db9c267a
-
SSDEEP
768:JiPgcMiR3sI2PDDnX0g6sa6M6Y7N17yb9YkjLoTyS1wCZkoTyMdtbBnfBgN8/lb8:J/l5NjETzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b065c1539cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000000aa57f4b0df151e55735aa602eefc184f13a68ee682a340fa8f0b1a20d583fee000000000e80000000020000200000008c6cf9693f6377ffaea10808a8e4773b4c16ccd9a81d23a33bd170885177c80d200000004b52705f0bc3681b1744a6747c3bd88430c7a72a28b50009b67a8682c8eb5610400000001384ad30dfc0b6b37fb2b9d071b44d278fa58b3e6c095a076eda7d1401b340b134286e4304c713aa4dae0b5fd36f0e72d7cc9891875a849679168731f1dd8eea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580873" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F173CD1-188F-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1764 iexplore.exe 1764 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1764 wrote to memory of 1872 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1872 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1872 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1872 1764 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f0cc5d03b325a1bb8fc2e2cf3876be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fc77eaa780d73c4b2ca39d77138af75
SHA12a9a2b589c4129538cd50094a756e97dc0bdd6fa
SHA256e9cce45334c7ed7d93877bf4d7056a8d662d6205b2a27093482234cd66c025aa
SHA51289f7f761ea2123f7b3b58c6fe188bba5f6a7fb675d6962fa9dd952b2395cb1430e496b5558425ab87ee0758b84956f81be0d47678cca8fc590b172b984f66132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199bb11bd4d7a58e5a6e2fc0b4934725
SHA1c68f1034827234e1e7154e99ff48c5df8d76032d
SHA256878c7056479953d03ad2301ca84c540a09b4ec5c5d45c2612bb62cb653be2785
SHA5128b05ea544872e83733fef42a78e3b15a3b55714ac9c3ccdbb5751cd5d29f925197f956e0bfc4948a18aca2ba62181acb92c47c6cbb9e8c6f0b5e0e04bfcaf968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c997813d66d2d3004581e54d8226d6e
SHA18281e86e58e14a819b61363a79118ca6619dd9f8
SHA25671555db8d7033ffb057bf2215cb2290e32f145002b3c0e42d462c78dbed5588c
SHA51229055197e34dca300a257d47ba938075edf63597b3b658d411718767afd6ba13dbc36588c111c673ac7fdea68e9723927869455e0b80431f394c10701be70075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58982aa12494b70e46a6d983a2f312a63
SHA15d5f4555291a50c5e2d612a9cd6070a93a558ecd
SHA2569fe242f1a425699ea6cd97484601110e7ca3c7a7a4ec65fee247e95f78065ad8
SHA5126d316d42953cd41b769c4512447b402b2187319cced2e128baa1813f86c34bd32a8ce972f43e063c3bf69b2eee6601a699e3765b1fb14ae5727b6abf15ac1f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d366fb01ebaf669271f56dc3bfc5771
SHA10ef5953f86ac66282e581b972926db460c644782
SHA2568d98fc8c1ed5a05b095082205fd13690ace031796f7bf1c6c2455b0dd26ccb77
SHA512993db7406c293ccbb81b16392cf8a2e3807749fe05db0ce7fcc8104eac7f4863090eb34ac8273f3e6f48ca1ab1ac7e7a1f702c188a9f16829f6e11203caa7b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505715232f8d3d264d429533a0e9820ab
SHA1ca4ee462b5fa3211cc1a08631ce7b009770a82c3
SHA2565249b5b42857038c1f7255a30fab539c018a26c5b9debcfafcf01c96f10c49b8
SHA5123349ff7564877a56219ee09abd120e514896e723ec3703e6f55eb59492c1b2f0b67ce82cca808d3d13f7f1f1da4712cb715274590fc7e5c32514b1f7a2f80588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b71a46b2abae782d130808e80fd5c7
SHA12849dc69cf053636f5926713a5cc26461f6ab3a7
SHA256cfeb372c5be4d338cc11bfd9d43216a2d3d4c5a35fce1fe50b2ba8905a284b47
SHA512597d903d70c9c7a63b4abe5bf9c66ae32718b77cd5d43887fadbb5d608c5f773f2915e80ab729ab2f147f1b13936b05c84cd1c9ae1f4c1876fb9ad845dc72e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f3609c179193e958e6381d2482e270f
SHA17fdabb626ce55ac3d061979f5bd9d36af6c52ec6
SHA25638817286fc4e666b51a35c25128ab2029ba851ba340d9003b38a1d4f4c1da2f1
SHA5126607df7868234cb923da5b7740674b93b54b0f4599695889cca57418ad921662f37f0e79aaf0262c7a974fb36b6b654c461837212b5a9e8d80fd3ea1f9c7a36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52504f53c535228c5d7fc19b4316a8a48
SHA187a42b6157eaca5d642aa49bd125941c1c3c161c
SHA2567b2284d5a051c350d24633887f7b57d75fcf5761bb49087076e01a066671876b
SHA512a9b85dc52fd94f614eaf1a30f7c86253dfc797284564e57799bcb14acbdef4014c4a8d6d681a62dca04b0a4f77e19524a865aaa7edc9e6794e2a1e30f1921aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a125df6cee6a7ee5e6acbab2511bf3db
SHA1130b76a6285cbe819004002df75d05f0193346d9
SHA2567fc4a64a4b97907eee35e9dd74716ff6e6b16251d32669b14e51eec1dc59ed14
SHA512ccba3d26a3788253b9d492d72cffd2c0117e54fb47ba6c20e9d86db883322589f5b43f0bbed255ac9d4219a4d31cf0963e68766038cd09bfeeb5421030b458fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679b0c79fdc294e2a9971d737af573ac
SHA1a83d51f40beeeaa95b753472772a0c405d34af4c
SHA2568ee34fb8884f668056d5b8e6589fb38c90a39657363c9977087c234817ba4718
SHA512df3631aaf9110efdc2d414486dbf3a7c92151aaf0fe53d0890cfcc586c47817e77418d7631abade21cb2bed55c36e3d219f423dc8c68dab5f3faac528a33de84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b20a661491602db1b95ad51a158c57e
SHA13fedf936a65a9158f7b20482bea8963c76b63435
SHA2562a0135691b6b066e95aaae32cfc1ae47666e8487bb41110a4a1cabfdc37c0257
SHA5122479500519e7497aa46756ebf00c9b2ccc1071a2417d4132dd38b6064c14400ee1a2268b96ccd3e98e3a03cef032efd50c935c9ee8b1de1896cad19c464c810b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa7c0d326f4ab593fca47676a49a03b
SHA1e724f778a3f5c595a9dedfecb0b13b74fb9ff646
SHA2561ac7ca04fbba0070f16c6106b2c1d94f83de24d446ec3e2975ce20ca5adc7170
SHA5126baafc38b8fe01b3da3b48d8b80d598af1a5bf3b20f139dd72486d32db353929d2616a07dddc7d201cded342840488e358eec4d26143838ebada74d6f9ec1862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c88594399019941352bdb591a7c89c
SHA14e5b984355f30edccbbf77fc405740e0baa2b873
SHA256f9e3460e3d3f1b294f50a8e2024cac489655a30a0cb6038b6cbf84f3d775c52f
SHA512f1757757b3b73de810ac3c7b8dce58e68dd39bb3c337fc56caf5c4fa958cba8fb280a1599e5198a48a1f6b6cbf0b8adc837fd033ebdd0b3e03449dc6c7019853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0958ab151f017fc0427f70f6adc5c7
SHA17319dda0e3bd46c80375b673438246bccc07655f
SHA256c662e9d7a06034462b14d31ed68edc7ffdf049a92c57a1533a5e8f0b8c0bc76a
SHA512814830611db7b97fdadb3aa2a27cb44579f220e7dc857fcd43d333ba18d6da1837b3d660255203ed89281ecf082acc858f7dc0f5a129f668e197863698202aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52379ce910fbf403bde799bea2dfc6798
SHA15118103477fc138fc3239e9c41e8094b5c8c4700
SHA256d0ea1aa122ed4f05491cb73c680b9aa2ac2f97c8a9d5db9f43e97466db96b382
SHA51254ead7c521e9bf7d723a1525d8177b443ecc22bc96e5e48a14f43033afb8aacfaa95550f4721c58ce72627423211ce3e00b7d02641f88e23bcdc1dea3cfd5031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce4227310b091496626063a80a7c891
SHA108d5c3214d47f8a11e485e9542ecaa67b57371d2
SHA256ced4acce0cabec151a271b79662fdcaf77f39c0916c13beb97458d01b8b81ea9
SHA51259de9810dc26a340aab7b169d1642679709dd8944e4c09521ccadc19f00eea017a33022049d3c4815eb644ddfa81228351dad5262ca9c4344a96926ed9231e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51083e616a86f6e73cb4bf533014296b2
SHA1bb3e4d9ab3fb532627c96a7e90b4ce7a6c6b1aa1
SHA256566d7c14994a23d24b2a48d0b0a36a7efc496478aa5960c4c203b211f8835796
SHA512949ec4140efa21d35dba9129e4cec235d140b8933181cd4503b2ec0128ff2ebb913ef79dcbe46129ee57dedf25f8cb9fd92bdf9d7b40145ee78c1c2ecd2764aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec13d9a84602fe5193387428ef7b7ad
SHA1e04a2bd2e47640b71bc63e8ff9b086382102b916
SHA256933c0f81e0822902dc6a259db1f078456e3395d090755c55c87655aad2f33c57
SHA512bbbaecb79a74c267255c6eb621cd5a6c6729284591a2aca5e0cd8bc511cf71245809e9259a36f72f286ca4d8d3ef9a06e8293b3143b14f592bce0035712f4ae4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a