Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
68f4f6e4e34592f64c6c60d3deb9964c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68f4f6e4e34592f64c6c60d3deb9964c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
68f4f6e4e34592f64c6c60d3deb9964c_JaffaCakes118.html
-
Size
3KB
-
MD5
68f4f6e4e34592f64c6c60d3deb9964c
-
SHA1
b7a0c6cbbbdff3a2ac7d144c3b61eca04ed97d81
-
SHA256
52d97bf5c19cb1997120e8634fdbfd3bd8590ae2918d81bc8ad6379221d8b195
-
SHA512
b8c4336fc635647d5604fa1b74bbe148880c21e974ae3651d6d1016a35b4b5f560781bc43cbef4f064575d8d8efd7bdc3273e3545286ab1d97c0512a7cb85ffe
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80370a6d9dacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{986EDBB1-1890-11EF-B69B-6AA5205CD920} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd8394cff025df40b43ff0314732ee4400000000020000000000106600000001000020000000a22606264e70c779abbcfce9899c28776287a7e60aff8eb777b3a67e5eac7386000000000e800000000200002000000000b43643a27feae6525533ee81694a1e7838da86810a1704b7e5f18550c2ed69200000004135ac934ed8894cb8ecf4d0d8cded45b825a5ea8a80874ec713c99b79fe190440000000206af24b0c0f51f31213dd983e5ddfd7282b25e34a0ca3205c161d14f055809486e9a16a4d29625c36b13d5e953565aea754aa326eed36c6f5400b51712da1dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1660 iexplore.exe 1660 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1660 wrote to memory of 1624 1660 iexplore.exe IEXPLORE.EXE PID 1660 wrote to memory of 1624 1660 iexplore.exe IEXPLORE.EXE PID 1660 wrote to memory of 1624 1660 iexplore.exe IEXPLORE.EXE PID 1660 wrote to memory of 1624 1660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f4f6e4e34592f64c6c60d3deb9964c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c505bdeeb867ea52fed84ba2f0ce6847
SHA1f6141c9210ae469d535558f45a202dfa216bd473
SHA2560843595f623617e8bf83cc6eb164871e4f2e218f0f0bb10c1d22f33bbaf900e8
SHA512790789477a9ffc4ba4508008caacd1cb2fb4b7348b3fa63fd56d55a21832d5b92fa7e7a6f43efd3db5bb8088af27b079cb9d3baee1f1bde7e9e75bed2c36ee17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ccd5b7524ee7c368ea84e2b0263d11d
SHA1a2e699112fe6dad2b4cdbc655457967abe21c062
SHA2567b3254753d705b987e62582944c654b71d78d9aec1234d7e2f558e8be6f9248f
SHA512e7f4463ee3bc39a4562886c4069451035c10683e0702f6bb8f56ac6404bf21f478f690750e40bd2475248601ccb6ae2b6ab809fc35769e35448f5b0412afb15e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51abfce78285c9b9ad29ac04a320e982c
SHA1295d106aa303f259c92f127fcacababca49d7f56
SHA256a3e1fb647b538081e3e704f82d7b711e4f6b3684880106367569a63bd6fb1fbe
SHA512f121d426ef699a0cc2888d603345497d08146f64e6bce546ded6c231a69f3f2e321d4989eee08335e31fc2bc353e8dbcc51074170a165ed4708c27cf139ef304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0036c68d371a025339052d69a41244
SHA105d64a35a044a65c609bc869db49c7cf89c881d2
SHA25614cdee17814077f938c2e4ae67c164fee3885663deedb5f954224b57c7d34103
SHA512c258670842ca92fb6e57b8f21e70cedab6ee0591559d8e462614548420edf5b7e9c750aea6bf173c87ec89bc6840cfb8ba839bd15488b301405667df787e8d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ea38ec0602a3c7d2ae77160d024962
SHA1e0637bf1d4425ce3063abd114ff7ae8b5178e0e1
SHA256ecbbe28bc3097422b7c7ae7f3723ec224a39ef4aaf6df94068dc50dde31ada08
SHA512fc89daa3fea4edc33d4c2d9333fdd5d04760a1980979ae4c5eaab8e3e2190201303ecde001987a75c9bf9ef2dd1fb86decdc3fa2eaf884ac9ec8b3190cf0b602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4198ecaaee1ec4ae78a85a57346acc2
SHA101fb436482701244c47344f6f166fb4c9855b25c
SHA25635cf0bb7379e5f2c534ffa375185b960925dbe8165eb5f4647d9a248e7767a49
SHA51205ef997c31cb2cd61265ed0a2a5796a55ad193689877cd7fb0d5db5193cb45e98bbccdf8e43c7a33e8c44b08a38ea4a73b75619a6ed37ba6419a729ccb7c8d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea81f818144e2be6593e15461a79a879
SHA11b68f8e57c8707577f91bd8a80daa28011aa3f96
SHA256f6dff805af4e4da3b6b51125a646f8308b793d53cc879b40a27ffb89582fd2e9
SHA512062560409ee961903dda92543cbadeaabf9b0ab691e0644018555bb54f3ba23cc4514324b02b81de74d7cf7465093567e99bc9660de059a1833662240088f1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82c1f7bc6800163057769d334ba0aa0
SHA1cdf6f132d4a35d0f1fb1ec52a63406514f89be47
SHA25600e444ec08284732e51a1a6365d1a2fb591f2643e3a9687f1e703302153b9372
SHA512b7de37e33a1c1a2a982a01348478c898c9d3e673fb98ae021c1c052c7ec8876bbe44e4cd915be7e8263d5b4d46cc4d7a722a0d13bff13b82644d09a5e8922369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7695a431176efef73e07b92c168280
SHA1f7c98ed74c21f2620e85f889f4f1764fe1233591
SHA256cb8bdb40914b933badeb477ca76179cb439278c5a5ff62a63cbaeb48085f461f
SHA5121c07fc8972da378497b152c6ce5078dfa5f67c688a5f73dfa8b7122f73a073b674ab1a1f1c90f4dec738208f94bf581046d3aa6e350b6508f9cefcb79fd58940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486c6568b3cba1c4f1375656149f6ed1
SHA15dee5c357407ee71c34ba55e2d280bb29d589b2a
SHA2563f7427dd62b9e5c4caafa6da847669a4c51f11ebb1b716f0b8aa8cb9253da9fd
SHA51206a205c03213d54ea69483040ff9a7f3bf7a028c12dd474d67cc48a193915fcaad958f4b1df1db4234a9d814714fad2050023fec44c986b070cbe4f375a67fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c24460a700f68951f7f86bd5c22e4b1
SHA1759c5943d62e7e2fad4a3a12b2a300a28b40e1b1
SHA2562682b7552cc51c720e0fab465495abfb9ae62ea87106b215c1f7f970431793f7
SHA5129ef1bc9755cbed7a4524f7b17ead75155b2d27c5ca582d85bfec6f3e597d1e43a6d2726bfc0cc742879adeb1392c3d1e0082f44aad6d82c3f2b1235f3db2d13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5281707e1e90c5c6edd28c06f7d545e25
SHA180d19fa6836c1e0b677631ceba8fb27410364008
SHA25692a211670aba1ac3f4650f435945df9ca491bdb68f97f4b48d1e5e76c91ba1db
SHA51201a25be67e9e2e8526be05682a63952a39fd906cd3d06550f591cdc86ca72eb2f18d1734c1a0c5a85e2326c218967f3dcb3328a79351b383298692cc817d7cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a