Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
68d6258c4eb169daa9b372bd93e4152c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68d6258c4eb169daa9b372bd93e4152c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68d6258c4eb169daa9b372bd93e4152c_JaffaCakes118.html
-
Size
10KB
-
MD5
68d6258c4eb169daa9b372bd93e4152c
-
SHA1
553fe94806875a1fd2646ffd790d5c1e08addd00
-
SHA256
450809ed4359bf821051ee07d0e1809ce488699bb54f1bf50ab09f141be75eb1
-
SHA512
8f8969564c36585fab7eba13e7b3852def2a581ebdf23e2b2dbb4f81b216ce0de01945c003d5b804eff8384a6189702f72391297ba7b2fdf102ff3816886a258
-
SSDEEP
96:SIHLeepCr3jz3pfDgELcAB3AiUFEjw5RiP11hT3A6vB9f3GfblL1O+:SIHaepCrvvcAB3LH9rdvB1aL1Z
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b5ff7f158764a4196574d83466b752800000000020000000000106600000001000020000000c26b9e84436e60e80a64e2d7976a6e97245f29a54a14f6608a9c46aa06b09cb3000000000e80000000020000200000005855a8db011d5958325d5a35a6d3f96dc95c43cb08a4037b79e33b468241334b20000000fe71148c47c1b4ee14860c9b612d95f58d116349279c479b86cebe042549757b40000000e019cb09be766fc23d5fbf68df2dceaad3921a0bd70725564cfae73007be58dc7a557e3ece3286a727a4fd705a5f26a87c8fdb4ccb580e19987dbf6749e20aad iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fa659996acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1A72E81-1889-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578409" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2504 iexplore.exe 2504 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d6258c4eb169daa9b372bd93e4152c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385fbfe91eeace22db9711ee7998bd01
SHA1aae805e6f0446cdffb9f9948fa70a538f932ea75
SHA2565e9a5e1429cac3d4eefd3fd3e64ce84719b5fc564bb915b20f6252bc1e4d876f
SHA51234bc97528d591df8addb2bb8eebca6cab71f80d2b989d4a1074ba96528b2267de33044c83719f5d1903ae364a6d5d5c2b8311386d2fda7d0de19b73536e3061b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527aeb61671639ab22a87f3a12549f861
SHA19795f950c107195be7c6e1aca5226d7833bc1736
SHA256d7ed90a2c2d3ce28589b9645021ffc0ff27506c43cf65e44c7f92abe213b5a09
SHA5128ca9e8323e9318d4de17c407babe4278515e5c5d22aebc81582b0d3d220cc345163596c63aed837bcf56a97e92531feb209ad46ac9d3893c71f2d41f0efd71bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c68c3853db89a2e3ca34dbb6911716
SHA165f537032c1fc16f1ca5fb2a17bbfaaf119481dc
SHA2566daef7489221a74472c86f40dc62211a49959db3dbe863ece36006b68efd0021
SHA51230aabb5ce4e7a7250655ea28f35fdd7d0b098df4015b8dcfa5ac02d021d5ab295f878252e2db82eec708178a2b2c6fce146e2d94211e9c6c59f489a114b4666b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f8c8371eab8a40d641e4daa2372ed61
SHA1920f417e75a123ec1bf614223e7df5caadbd9202
SHA256a0afa3400bd4002eb9d871536083a3c895e79f16b7b8e18304dac1ddf76a109a
SHA51223f24f776e071697353143f47e7715538566a6e2dbe5f1316d0ba27767f1a1925a79de94bcc06d63e12b59ab0093db58cc1b8d20f2c260e2a1e966efa72711e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af51b3e359d1c44613c8c62af0bceeab
SHA1ef5590ee14761586a88d0a1057ddda584c0195f3
SHA2562828969eb8c199221416c3adda7e21d9ae557e44f541837a7c34f914e0eb97ba
SHA512139bf534faeb3fac47361ed488b2ad258642fd1a8f785edef575569661bd20fd10cdb45c7d64ae8403aa0e9d95171256dabedf1d890965bebc4ace37c4a4be64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d86cb49b03e767952bd4a70b8ff9cafb
SHA12a958769a63722937e46d814e968fc8e450ec64f
SHA2569002bf08878a26ffe7ce4615dfa30c767d87d6d18bc13fe3db659919dad5e556
SHA5127eb0f7749099a5fafa09d76f74d38ead2d3fcb652db71e826b2e7b539d0906b0d492e51564c9269a6bb59a912d528084c47e7172a993af26fc5d934b3072eb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f22e791ed60fa9bb349ddec03df8e5d6
SHA11489e639f2d8f44949801c418bdd516005ce8ab3
SHA256ca72624bd3e7d6178ccd4a5b22623fdb858d1da3e6d78338466d63a77da0d587
SHA5125437d5a4d22f5b3ae68963795f87fc4926cebc0abdd68bae6f223f6f58676038a75e1cd54bba2cfe0fa96944b5376d7fe50f6da7106028365a716e9d03688795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550aff5a83eb7eff7a4cec767c1b8032e
SHA108444503f3791f101e0367c85bd832f89e69d41a
SHA2560461056fb51c2d05b76d4f29b6343d6dfdabf8422df3a064cd4c39ed540c14c0
SHA5125679c22d2d1835d3c81cc075c9d0afb831d768fcc423ed26639938ecdb699e632146068699f667bc949d7d29808d083da6add2f4779c7574961c4f5e27a5d35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94d59ff73b5bdfa232e5087645f5655
SHA1af7a96a6f4abea32d9b143bb9673a145e53fb653
SHA2565707c7793ff1d0c0b90841874b38b56dc362bc934c44fb29d021937c30bb1d9c
SHA5127ccb7479e0fc262a64ca07e5782240a06cc816cbbe7a8462a71464a37183c81130caf963c7e4a4f3a9e6251bf5946c913fb0b0fc3aa6a2d405671f84721c59b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad643b9c8d41190c5c52058ca732811c
SHA1c0418df0ec72d84370b833aa7e1ca81951142e53
SHA2567ba01cb48a2e7d628008aadd981e65ca6722cc353344eabfcf4625bdd639ebc2
SHA5128148e8d5966001437ebdb7d9e4ee33e5d93802c22f2944c0027738017ff83a1e5b379703dac6d9e7c68e4f229e31f778eabceebf40d3f04665c2efbefa67e3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71da83caf258276ae16a35ea3ff3c02
SHA14d352cc4466ef4cdcf98b60b2c2fe0d4db008ec4
SHA25636274a72812db9b67a5821aa66cce5ed2d51d759fb3ab856a5462316834e749e
SHA5122dc72f638013bca1a212cdf585e167980ab6cdf1df5ab2d064dfebe5bd96161f8a9f7273be1d80dbdad6e64612768575aa49b1226793fd19129cc7cf6aab5b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a045eb43a92b45f8bfb1ca38c90672f
SHA11d30f08c604fc28a1fae5c32adbf4bf58f8e57a3
SHA256f52673c91075aaeb4273f079e206f8aa2a201e9d3c8292f01441bd7f315e6fe1
SHA512966dd0feb17b6b7c569c53352b2c83ac032f34a38a194cc9fa7373c3787ca28afe852245f8f009175fdefa06c61d3426ae5fee8339b491f2f923a385cb4ea388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51247332723756a04d5c615deded29763
SHA1e67a350573c0a8146cd5e5e5ddf0e01a43b460d2
SHA256f051d7fc192c8ee4ff65cb5c7bf3d1bc6cfa15a9dc329aeb171008fb0796c03c
SHA512a0f084c0d72d090706d07be34d7f63697b662b744ff1480025d49df4a67586750e1834f9949e08e2d991b262c30ee46ded9afaef10c26f72619e26d09774fac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584c1f27cea6063290d7127d87ada87f4
SHA18e716036511bc9824369354cf434f4fefac7da4d
SHA25652982a2757663410c76405e2e8670f3ec924b7dd8987a23883a06580e9a66871
SHA5125d0744fb6b04107a0b86f5545d0225378929593699d83f5d83913a6dec8b49d98b7fce870c3991b135d475d45422890779b132dc63cb9d2ffe0476ad4a17669b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a6511cae9d5d190ebd3f7e0e5e3519
SHA1e8e37b6675d82b173f1a060a389dc4dec8f83b90
SHA2564d790d12cae331f55b4b61e907384f182b710cfaf9ca7815cfc2d5c014766f9d
SHA51289a9079a721ceaec3b65a92ba8cc91cd2cd30744e295f03119fe0b8e9743091f412225dd9125b8810ffaf8117df044904b59540317f1cabce7ab5f93f0b8f907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d7d5bc353b15a85f59d8db29112ec1
SHA1adffb482fbf3c99826b34b0d24bed139b067f713
SHA256d61c22d1791d919ba39346f595d5b2feb26f075b29ea37bc7f9fd58be5d4f2d3
SHA5121805c17fd7be873139dfe46714d7cdd5e644c33f0a148736676876de69b84472534e9b4155dcabf9e0c68816bdcbc4f08783ebec8ce38329200bccb8d816be59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412578711ae17ad5f63ee23e33ac73af
SHA12bf4b419a408b77f59270684bba72b3ced0669e3
SHA256175f5bcefa4e69cad7f69cf3f4cd590e21ad38afe09ee8560834f8e412ee7068
SHA512315f43098aa9ec42566be247785b83969d75aba5e2632914d61715fa14658abc88a195bf9a64e1baffbb8e75bf59da56d2522f40ef28aa24df158ee9bb9abc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef580ddd3fdd10df9e9ebb6de55f1633
SHA1e3249fa912f326682b7c54b60f37e5b9dadaa201
SHA25679456f61395dc68b65ea037335c3fe0ab1b84c57bc01eda761b314c5143243ab
SHA512814416f27fa13665cd0886320dfb52cd2364003ddd174f895e5443e00ffba2f07bdc71868d9ed70894ca6bcfdf460d7ca3b4f86e507d08d107fb96e9c5b31cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fbad289f051f8c4327af8fe2a74ef11
SHA161dcb8139afa4da8adec38486ec0d9b8e5f9457c
SHA256489b716cdccd1d0d1743396d11fbace7dcb35abd03b8d85b0196b17f06dd6cbb
SHA512c4a5f76dede4f58f1849d1afdd60c75c78f13013a007e63e40f2e007af00028eda836ec3b74a2d70bf73d3d71a3016b9c95c4af7fcac9853c4f6c970c75dd596
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a