Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
68f9379d56a98103f71b608ac9ba3e35_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68f9379d56a98103f71b608ac9ba3e35_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f9379d56a98103f71b608ac9ba3e35_JaffaCakes118.html
-
Size
4KB
-
MD5
68f9379d56a98103f71b608ac9ba3e35
-
SHA1
85b71a63c170fbdb8d3227df40e7908e7f2229b1
-
SHA256
1d54bbd987e622cb07833072a63fb7fbf6629e5adc016566bced89087ed28be8
-
SHA512
89b78b90edae79dc5c9648c08e6ee2f1f7dd8a1c849d9b659d97f51846539e3da891cc131bad476b44c10a1f4db806f5a5f5d6cf133c05eeedba1c09be059a09
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o62SyOWc:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDL
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100b9b459eacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dfa1cd816208e14688c68e161e4f2ca4000000000200000000001066000000010000200000002c4e28e7c48295668b8baa5d452df57d12bade10f82b2162a5cb84d5300800dc000000000e8000000002000020000000c443538d5907f424ee4e0ff6739f9d9d052acb3296d09c98c610c4f14b04ac97200000008dd1ca93ef8e22f30ab2a5cc36850e47b495cca966840b9d7fb304de4a98ea9840000000307e3cf4b67649e19a6bb2db4a13cc1ecc90ad902ad7fc35bca3ebae9a57e8171c41d9693648128693095f2422b108fc5928057b16ff6b9484a774ec082d09b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70B94001-1891-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2292 iexplore.exe 2292 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2292 wrote to memory of 2540 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 2540 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 2540 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 2540 2292 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f9379d56a98103f71b608ac9ba3e35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD525b118c8192e5eb32300b99653a06d24
SHA172cbee852e30429724aebdcbe61c8e3848d69f0f
SHA256ed47a69720046d3d94777c443d37cbbcc9836eb717f9aa8462de7fc57d090b00
SHA5124557fad756c76ec03e017bcaff83049975c81e0a3dcb24b754fb05a9002395866d8402de8eb5884d711be4bfb2fc50847b9d9af2eb55570c3e1f6c83eec11b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD577ba43f375425483018c6922e415f5c1
SHA1e7ef10c40ea25cdd1d8010748dc4e035a33a531d
SHA2566d39c8aee5e6e316dfdc58572604a72fae2fed81fbc432097df2661bdbd982ff
SHA51216676a528e2bfd7885946c5ab571022d55ca1210cd1af6e1abe9688a1633c899ea78a76e4a6db180f9d9ca7809ad94529ddb3595dbccb26086309fe1bfc509f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a39b2a313c67952bb072ada85e48553c
SHA16bf48d3ee5995fb767b6cb13dd897b5dd30235a0
SHA25629dd13660537397a814e6f84052d833f326739fbe50e7df1a6f63dfb39a6f73a
SHA51223b1c367458cd386476b334c61c8b6cb0015f0815dbd57bcdfbd95ed4c86f36be44e5d415c66fdda5c67e59733e47938ace81f0d9406b2b785d531d2888d5e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aefc9f038f8bfa135e031fb4152fd5a1
SHA1a59320f579ac3ff21327684f18ff9c31c24e79e3
SHA256b064aef55960ca54006bf40688e7f3533f0e1b34bd6e87d5a0d8ab099d60417b
SHA5121a1ea9888093df029cff0e9df2064ef6e51d9b879de57da528bcb77848d7c9a5d24b1905d8316a77c92dacbfb351b817a629500696ab7748fa410da2752c4753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57742d25ff368c94b591a7581ef39677a
SHA1e535baf1b8c1a04d70b3f150715db35d9a73a1ef
SHA256d81e2368a4209577a54cb66a051fc658cc2ef9f7d3345aff28670a438920d073
SHA5125381ecf4fe9aca01a32ea866fa3a8286f2daadf370838368064e69a0e07d5d5421c0f4a1dc74dcb02f965a5272ce6b33af0a93fb90c9dab5b8d62fa819ca8173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53432b45fff3f645f51781471ed2d52ce
SHA19119e3aa675e4d862ed6eec5854c6fc144f16211
SHA256dfcb5144b60e18c292a2f91434973a79ac4ffdbc1160f54eb56924c2235bb234
SHA51242fc170c8a872bd606e190a4288637e448323aba874e70b79b570fd9f567b0bd8df74f1a32255858cdf0a61cca9a23536cdadeabcb8cedf14bbd806ee5cda02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51c59ee6ff48bead51e3bbfbf8312c6a2
SHA182009c17f1d6a2f4a83a14580e7adf405c2052cf
SHA256adb30fb63863287cfc70ad993459004e7655d7f05522085f6e32c8d8d9e804e4
SHA512c10994c8ced74bcd23c7bde489898dc0b1794924297946a160f7fbf4b9882a0a8f4eee0ad481d473fe7c71bcd095fa2aa224437ed6c0f154a356c6efdc11b0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5912c6f86da10de74326f5b3edb88c4bb
SHA1ddbbb29e795d73e754d62d460ce92251da103252
SHA2563a8d7aa7770b00201894bb77b58ef87615f6eedeaf7e153e6915dcdd037683bb
SHA5127063a91c58961e26380cbaaea32f516267ad8a76d38f74961855d6f4c153bdf16e931dd42f58b8697cdbf043e7a2299b318fad6a23108be8c09c1739197665b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5638a67e7a3c769b183bd8cedaed03850
SHA1a7fcfc59bdcdd9fa9c8c02e2cfe1d2de47482414
SHA2568fc8c8d05e6e6c5cf0f0ed1c676c8c31f1a3b9540a75c3f4b0a7eeaa878882d1
SHA512b6ecfba58ee87400f19048517f2e129efbc763f9e84cf69428a1966a0d91dc9a521eb9f40a54ad90da89f0cb2d9bb41afecb928a0dc70793c36b836eef5d8120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5171efb25b68b93795ceb42aeca196ce6
SHA12494dbf79ff5b0888b45cbdf06e8963b17e24c67
SHA256b39071becd5a90a38b94b5423889143f9d05331c7598ebdf92fb81ef35448f0c
SHA5125f33b13288231753de20e0479449e25d9dadb9b85efab32c6e0301ba71d9500f56a48675f468a9f08589342c57c7f3a57c7c087a903f359466c18c7938658944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD525210e36e5e88724b10bd8bfc311e8a5
SHA14ce6bbe1f81f38828cc3019cfcf7ab0fe42932bc
SHA256018d5f0736a43df88e4fad35f6755abac66169a2ca312595a205c7d2d5722bca
SHA512031c5c85a1cddd44e80b6f5d5ec372114131905413003ea8c7634f78e20d130b705d33caad039943c6610678fe4dbad5da8789f85ed8e9059bd76b501159293e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cd92546c421265fe018bf8a461857e3d
SHA1363767e8280946c029a0f52e41f7524e19804cdc
SHA256bcd61fdef33ca64899d9578c8b8322e1a975a29d398a397fc74295cd5821b17d
SHA512fb85b6214fd8b902a36767627789308bbfe8c9a21c9f1af9709b6b32b23e3dadc374d2d8f989080ff2f193dde5d594d52803c930c2c1061925c2501cfab99915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af76b735cb996e0c778e787e46f36f49
SHA1cff2e52c3502eb88f5e698454fbe673ff7a8ae62
SHA256adf754a1ae74cde9446d0c92692405790d981761bb5e4810e4c634b67f2c9878
SHA512ec6936f66beecba2bd5f1d925953a51b0ee135948f5e47230e8ae1a53711295a157156779e37819174fc61491ffce5478e3d39378b3c068a8a68e7e2a6b658fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD538ee9fb00ae632d8c3ccaaa38e3feaa6
SHA1aac17f2c708ae6c3cafe3f650ac5b48adf1064cd
SHA256aef5d7c0ccc0748f407c980a8ba5bc44e99def43dba76ab616c735105614c894
SHA512f0072e6c180356b0bb01fdae7e4d0ee567bfb0b135ba5e4a59106bde8ece1c671456a1b2bfeb4c86b5cd332e39aa1512c541f0cbdf3946aaf110a0ed4fe6fae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f975ed9f75187b695410d15a1ca8b53f
SHA14d2819bbd63fef1b24529a22ef787a834bf7e97b
SHA256465bb26e5550cf3f373fc17be515e4e6de1f83a9b9b7507ef0a9344b64f1af61
SHA512d6519bac8dffa4a7aff2758e3ad20fabfcd4f63212272f099a53261965aac136e35c7aff1bf802f37c2c927c38f5e2cd5e38c09743a5de79f6493632b3d15848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD542ce65397d9c35079d8103e416395bd9
SHA16213d1c012ab510a3930ace5483df61c7fa6ceb4
SHA2564a163878017ee9377faf79b894dda351bbb6c0c31f244878ecc25231c9d265ad
SHA5125ff10ce7da345d2bf5f180609f502744b47697f865a8af66ed573b67752dc5f465c54dafcd980637730d48ac3e5524828bbb5e20ae6f7f40db46f710f84319f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5022078116bf37a3775e3485f0c126024
SHA122482ad60ee51655f56c229e7cecddb4977f0995
SHA256b6d0e10c7a264b0ec4d6560a8b80d824dd6539a6b96401bba415848700b87295
SHA512a69db8ee5ca76ff7cf5cb1c9eee6fac255857abf7c7bd6c69776bd4d2b8459f82f807d47b9456a9dc915694f92e529f58815d3840c9a2e4cc0448fc97cfc7ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c50d7f9f167dfef6f61fdcd52b5ae9a7
SHA1a4a9160b206406beb67a9d9584237321e2306b41
SHA2569964eaa5edcd9ddcb6b732ce310b7ecefa518271c56380656b27e10e5f51aab2
SHA512da5e90b567068199aa5f04fcc7e12241fee6ab32777768204e1b6cbfa8e847f775f29af2b43b961b585a1359a72f2a45c72f70b9dfc1b4ac15443e301d78ec6a
-
C:\Users\Admin\AppData\Local\Temp\Cab9935.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar9A66.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a