Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
68f22f924a4a1c315ee037bdcab3d5d0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68f22f924a4a1c315ee037bdcab3d5d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f22f924a4a1c315ee037bdcab3d5d0_JaffaCakes118.html
-
Size
33KB
-
MD5
68f22f924a4a1c315ee037bdcab3d5d0
-
SHA1
496419982b0f1b3244b11c8e16a47b0097784799
-
SHA256
2251a9b54e78f8043337eab3ac3831c0ecaabaf7fc9501647c63a2d83821e7e1
-
SHA512
47d939bcd3422027ffb071ef0ffb42dab5d0f6dbe2b5327d7223a567a389185870e1c6942b5f9211b69e91d8b3f63a0eaad963adccd57567679d6479c0d7ad85
-
SSDEEP
192:RINoDTZGb5nBnQjLntQ/KnQiecnjnQOkrnt4fnQTbnUnQUhsTwVkwVvwVdwVXwVr:iNohvQ/4DTW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581020" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000fa7f72402ebb8d1c9a32f93413276972b9bd2b0d501c985d7cc0cffb7ddd6926000000000e8000000002000020000000c8d7b803f27b424404069e5d8e411c03b8455f14c0739a56030464972d015e47200000000825e77a475c7ec991b3828e861001a01dd508c3d77a1fd3efc83b8e99bf952340000000286f5ae4790380539650726de8d275c97b7a7c4790ea40a233c89e5785dfb8ebe4d3abd0cd52764a6a7c85464c39d8509af876d2a01c605c1b56d92a073be915 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d849ab9cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6B02241-188F-11EF-A585-5A451966104F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1964 iexplore.exe 1964 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1964 wrote to memory of 2572 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 2572 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 2572 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 2572 1964 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f22f924a4a1c315ee037bdcab3d5d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549c70dfa43c316cb1b07eeb0d2f1aae8
SHA1d70ad34543c4b8cab16161a347675dd7af999efe
SHA2568aac7e6108fbf96a099b27f3863fcd6c9051a30093c2dc82db081c6b6ff99e5e
SHA512b6aaa2a75463e755f2c054790901dc43bf59832a4a06f4e47c19d6cf217dc8c45700f7623fcec9ef5ffe9a5eeb905b68649b6d517f7d9f5957efa68665ccb339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b109e1a48b1d62eeea96b758f15d6deb
SHA1ff780ddd22e89b9d258affdd54c0382a881015ba
SHA256589debf8cccccaee2f71ee3b64fb59fa4e0427f38acdb0e1d339899876c2178c
SHA51217399d6e7a8fafa845d8a60ffbd2109631fe21eb38e0f36ea283eca8828b4f0b00075ad332952b2117bb1bf1cfe792ce1f97b2aa35175aab4e98e93d05b813b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705dc674f7a00ff074fc0bfb7bd1241e
SHA1b43d68044450e697967946ceab4f015fa0b0190c
SHA25643d3f1907a54765cd81629edb49724e9d1ccea12b5f4ad6539520a41d8ed4f46
SHA5121ab1e9cf32810e5f9b87dc174aa05978e93b5c11f49c01137317bb48620d4b974e1cc34cdc647938d7b076171858c7a8fd9844ea066eece9ec2bc1f2fc19b02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eef4f7890a714ef4e95e596b425fca5
SHA15a612d7544e22e1f13512487b58b984c4ef343a8
SHA256d15185a73b87419393766176721c2ad8b255606f722917fdcf9e2b22c8027a88
SHA512c66635c07c34f830b5b9195bff5eac6fea2cba338c23cf1ff03f94fdd193c5c565fb21007eabc76ea1d0521328ff8f92e2eba9ca3a6a287ab3f9fb2d1d6839e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e31e97952f6967bfdd8c68b9725fd5f
SHA1920333a8134f1a047681709966d10265424e9a89
SHA256784ce0ec9c2484f213965d3f9a283e1af47ff859a79db41ea90259f15f0d0948
SHA5121db9c86ed6aacb18aa47929097a088e1b5f1f63400c36b2487a9d6d02bdc3a526f19d38754b8e31b038a0126bf04a6e33819b95c33e8ad7b56ea5c5a85015ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435d5bd001e5c2992477d5337ac2388c
SHA11ea72e0ada4447cda648b1c37d43478ddb49911a
SHA256f9ddad0e53336e7e2168d665d1bead8e4413f2edc811689e92346c9bbd7b45fc
SHA512a18ccdb71bad9bc112132b5cf2d699de40af9035952ac88b13c453f08a209887b114c8ec12c57e07f00b8a8af7c91fa51fedbdefb281cf6f8e50b0ba9117088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524477a5edf0c0fb355c4d1363f8d1f6f
SHA184645ecd936d87d08e3e359527d2ca47cfbcc56a
SHA256bfebdccfd3ea406b583b698491572c084f471262dad92a1431b69fa45c214356
SHA512dcfe69640b390a8077864ad96b88ffd3b198976e79f0236a6598796ac429d9dfd98a2df0ec427167a2777c1baef1a5f322407f7e06200347f6fa9585186a24ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2255e2fbef8369f9bfff0090745086
SHA138eef7ead66c48fccc80b0a068ae02e2624afb6f
SHA2569368b9e95342a0c98478c36376361a2d83732ce5d5ca254ea159c4466ef53eda
SHA512f74464320abaa0a9c6ec5be98504a66d108ec5c67c7d53fdc4806a0883c261f4870242faa2956e0c3724ed9c93dbbebb0f313fa70842ba7b0602e2462fe9fe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb3ee31a032256899aaab6f5e841895
SHA12e9be83d3fb49765f2b543a9fed65b40e853a2f9
SHA256947acc57a88dbe14f2a457be0dc9824bbf99525b51e6c652a0e50d60b2069905
SHA512d88c03f206984f99c26f3f4327d07f4d68e1ff270494bd518949d0a2c540296690b8218175ea2e8a2398ab4323fbf4e30ca90c42cdd6786b64e574878a16a85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396951455881618fbb1e1dfd2856c00e
SHA1dff7a0d7b45658dd86a6e17ba7f47ebb3e99c6f6
SHA256f7e7f5514500370e2b14a501db6488e52293f73ac531cb9234999922b49baf2f
SHA512d4f74504ee2c1d807eb1074b8e923bf3ce1bb266cfc00b437b36bbae94574515da12b1de60c4c1a3d5d8d89a241475ade1a96148068615a0da41494fc7849371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985794320e12feb3c0553b046919edc2
SHA1f2e72907f4b775ca0de33d96572941df09195c09
SHA256f7d033d0ee33eb7c41dd83080d738b5a86ab7e49dd879a861c4e4285ba0499fc
SHA5121097d2a4ca8820eb1a1274fa4536e5955df053bd64cba3e0e07aed9abb90cfad63f2f1d07a74335ad88d8feffda144d82088fed57e204b02698d78a36543248f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c75acf388f35b7398aefeddc550e879
SHA1fb93e4fe8d47e5706aceac8635323086bc833524
SHA2569a665cc51f057511b4efc4a76b68beeec3b1ce6851c4ff43caa11ae7ec37343d
SHA5121d795be2ef692a19aeeaaa39552a91f99f9473ec00084b8f7e92babd05a278ca16b0cc38ba20580c29c8cee746581b75fca3f8c63345ba806537e0c855b4a29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a24321c6565a1fe588480d639b367753
SHA1f92a4341c9eaa644d06b440c022676bf8f5ac14a
SHA2564c2723e55c367dcb6229afcfe6a37d3e47fe16f91f9f6d133adb237fdbc3d670
SHA5126dd3cc5d8adee463798cc12ce336c3b50bc925a399f5b061a40ab2a572ff4d3f8e3ea2ef90d238c2567a5bfe29d2fe05d41a5c5216428e8f52eff5d866a1063e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a95161b67068401ff0ecd1b52f28076
SHA1acf3cdf1afc1eb8bfeb1e3264814797b79f8433c
SHA25616df8aefa8dc5ad9b7aef67bfa693d04f70854814c1f71b33f31e43eada20722
SHA512580a8e3209a95ab13064f50aded18e30c2905b46333c10c026cb77c87c5adf6e4375f7f52bdb2642dce5c13fe0c9184de90c327797005b0fcb5c058a41124234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6f3ffb292ed37ae6820bc1ef3fffc9e
SHA13118a03f0c187239622dbc9981ad7ffc831ac197
SHA256582580d8745d7390c844dd465d04eb94f1cff9bc4980f70ac3694465ad22dcb5
SHA51234ee57668602b1ab47e90051f1577ff2a62a63a9449abc7de6dc5381dfb0f2de1390fcf7b79964dcf49432c729fff3932703b1db6eb5f35561286d27c744439a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523c0fcde27c3d64424c18296277b1b9f
SHA187df2074a45ac7a3d19aa3c773b03873b7b3dcce
SHA256a2336fdd8162916c909d0422fba8771e80b408ea19b75e512f43c3d79d69b529
SHA512debd59d746e55b19caa2e8442c8bf2ccd7c310a41c634a905fbe6e362003a2735eed06e8ed4e1d02ccae90a6d7718e45f25454d432dcaa4a1aad76bf760478bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e199629d84632d8646743ee2ec673dd6
SHA1226f3c5c38a2193ce3c0b5beb5ab9e9405ac9125
SHA2562709ff8f1d53d559e5ca8634286c0ca0d67a369b8e32ccd293dfc3baf919819a
SHA512f33cf808a384906d879538abd9df2071f6139f3814329d14d234ef5799f2b0290586b4f16bb5bb126d956908d70afb7681d89a8f2c798bdfb441172ea218ca33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6bcdfb80b47f2b1d6aaf323686b614
SHA1d649ba7951cbe2bea1d0520c86a3e783e3cc75e5
SHA256b391ebee63f9e2f4168e0c7d2f4592f3cb59718058a00a84dce6b875ceea6dd7
SHA5123bf8d853e39c373aa45b3a99a79d99dad186d00e1e574cddf900a013e9b5eec905b22d50424fb15f62fcf64dc215bb8294b038f124f0f98597ed933bf7ebcc43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b60d62a0bf51ffe11b6eaa59908f070d
SHA1ed722f8646d955d5088b7961f6eea60d0a8b3497
SHA256a31daabfa6bb9f651edff44aeaab7addb327b7c5050283dd1af8380c762ac666
SHA51279c97df7f57b02af0476969588db33dd0c0a22bf2affbbc252dd76964ccec40b6fa4b300e8a2f6ff1dbf9b91cb5bd0214e4a5b197c1b396b836e0f41753da4db
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a