Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
68d7c95b95c5ab75b586f60e6a6e9cfc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68d7c95b95c5ab75b586f60e6a6e9cfc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68d7c95b95c5ab75b586f60e6a6e9cfc_JaffaCakes118.html
-
Size
460KB
-
MD5
68d7c95b95c5ab75b586f60e6a6e9cfc
-
SHA1
9d5e5e70ad4503375afcc8e7963d60d0c68df3b3
-
SHA256
430e3146217ea06498e52582588aa059a391cb64a393ea4fff0a355f749ecf02
-
SHA512
e87e82d54ddabe12b144808869b27f0e8206c372f68283601c07e79d80eb29227efe4e08c6711a2f58ad4e497846a697d9350dca5af1a7bf9ddb34b01edb5682
-
SSDEEP
6144:S6sMYod+X3oI+YHsMYod+X3oI+YtsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3p5d+X3D5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DB74651-188A-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d83a0697acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc4c42a0f18d8d45981abae19f8e3b9400000000020000000000106600000001000020000000bf2383bf3e10970cac031782234c603a43e5ec72038ca619e9761b34adc4190e000000000e8000000002000020000000675e515941f49b3c22a8881c5b0c7204d71df4351daa88b6e8917e9b4b5418332000000075640a71dfd8862c741c5f40f228bdb7c58756fe9faec1f42398fc44fc41cae2400000000e560629105c13e1200ec3373ab175ad8e83f3052e2488aded91ccbcfbf14d5867441c6ae72fcf0a498f06df70a1b808f00c2a1d1eb9f18728d8f0a750d97e24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578589" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3028 2192 iexplore.exe 28 PID 2192 wrote to memory of 3028 2192 iexplore.exe 28 PID 2192 wrote to memory of 3028 2192 iexplore.exe 28 PID 2192 wrote to memory of 3028 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d7c95b95c5ab75b586f60e6a6e9cfc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ebb2aff71a1888735a98cababaaa23
SHA1f83487ff7ca2c80190c44a25e90b4b3204f0b80a
SHA25656d05fba122a5c6736f8350b6dba9f502bb20035b8310e48ace6fc50ec071ae6
SHA512b067d291b784f7ab4cfa13c097bd9c45842e27a52abf4aaad7633c8e1f7cd9edf1fd941c4adfd30b85e588192de132c668dca91513852e817edd0b1cdd702c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aff2133db85583c7d4fffa504b6db561
SHA151cbec7690af274f07f197613a86b5c4acd56e37
SHA256228ba66fc28d9b7d1c48941930c93dd040e4ad084b8600ecc6e156ec3ecc21be
SHA5128b053167f0444a8a24b752d0989ffee5268eccf42741046a46d435573a9a091b573d98fbe284a8c3074108539814b91e0db40d29ce9b334974a2fd0861f6854a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c9ee80abba2f7934da224a6d0eff158
SHA1003f9553c82125d3b32981c5fe56618062093ce3
SHA256f99ef9601c62e811d22884f88c8a12b8db4a82ca0454ac784352869ed9db6bee
SHA512aaf92b163963ff063624a0d5af2ccc9b7f7819603ab60bdbc7a3334486a61ff76b85d253bc96895073e98a471d279d1dd9bfeb2674b56a6be1c3b4cc6d5d2f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d10626568bf4b39e4fa8018af408fb
SHA1412726dcbfeb4c4798b42fa0cb1d8a3687cc5daf
SHA2564471078aef896424f2804847aa208fd64b82f265d47178d5703732b2c85cb3cc
SHA51267fc747255180b409846f38bd0b60b22d49fcf2cb868e4a6f072a933f1af5c51f2128d9f7bbc91cc3142eb1318b526991b55f1c77dad4bab87cb3f0e790226d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5362ba87be03560fe57f3cf1658af6
SHA1bbd94bc5754f85c49a7198e48c5a264bdb4dd521
SHA256320b567dde3c3923d768efb86fac82af9adff060fbc9dae785857a1aa2c65dba
SHA512d448a1fc2c653e9ab189c49853eb745d4bc5272a773aafc8dca5b28207b206dbaf8308ac0ef8e4cc461c3f5ebac93fb81d7d8887cafa8a3866f2606be61f5306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7c2d2f6e4e6833b9ea0abae21129f8d
SHA104b739072b0db1167204d9f4c33ae9bff24fab8e
SHA256f9787601bce6c14d1b4d47fe0a78d70c8ed7750ccd6789abdcc0b7d8c8b90190
SHA51297c422eb1411ae8d856445c2302f679e398e4bd85d50f486c038c58b33db41782a492d863710707e95563a6b8073e2ef02f2dafc57d919fcec35ecc9de0be376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f212979b59c51c65ec4a9f388e3e8fba
SHA104b38c8f361c20c2328ae87fc13ffa756cade949
SHA256935daead8e2ad7fb29cd9ec9f98ec6643fa899d7fd435790011271470ceeb06e
SHA512b4b923e819a15e0162850928ae8b444055b233c319d92b993cf70a8aafbefa0cfce6376dcaae621a863fce495f0d28386157911700f51ba8ace67d2016c39868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541b91c7e9d293e6ce44ed8e258ec24e6
SHA1d8199c78245bdfe7820e6fcde3358ba1b17bf0c1
SHA2567d72cb8e4e5dd813cb06c7b3f4fa0bd9a8fb78d7e7357a825007cf3948ae16a5
SHA5126334658ceef735306bf9fa59a8c3c4ca29026992f79e4f52a99b3aed7e5da16bcd94f793536462fe527a6358220b456f1b148fbc91a8ec464d0a73707e5c7b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581c0928bad2dbf19c7637d9e6deb45f6
SHA14bf92d9a018f70afb000277d471dce2fa5325fdb
SHA256ce5ece4a82deaee28acbb6729e0be863004c82b8831298843b90a32cba9faa9e
SHA512f24a86bd0af613e904ec82418797524909c4497158a28c4ccead4902348ef353f3d87a60e2dd0ff63939ceebe7cfab1b39e75065c2beecfab6f6edb32fe8f5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12e123f43f8e659084caec4403bbef4
SHA17eef56387365616bf72c001a01c379740e27de83
SHA25617526a6103a35283bccf6c563d27154980e7e7714b0fce5618f3b88fb623fb2a
SHA5129bae277edc45c733d0568ed5b37e5642bfd6d4844896a958b47bc42849e7cb8ca5768e6369a7fba1894781aabfe4d0eb0a72cb8fe42d2fd6934fafc209db3ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee9ad572f0719497e7a590077a05c50
SHA15e90b21b6638bef0ba8ecdef004330ab5ff4e5d5
SHA256df88a210f7147d74697a1c0220ec465fb54b8a5fccc1db6e4b88a08c5401de76
SHA512f74bc7ff3a70ae4041738e0ff9b94a3a7f2bcf0d93b203dba76b9ca751da170c874c061315f2bfb94d254d1533f89f10c3cd9458f86eaf94accb9be5e514e296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb9dd4833fd63a3b255d2b7262063cc
SHA1668f2d5b6263e63ce7b0af31782e8e7365e6211c
SHA256b1dc590497f4a429a4108462cc095da1023ee9b149e5d2836d47b06b29c67195
SHA51255a728d9ebfd4a7c539a662a1381286fdabb521eff38421481e5dfabbc4d7d02a7960534da19bde1088140781fbd5a89338dffb009fd15ff7cdf5d762b58aade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518fc429028749b564b8c3fb439afbbae
SHA1d684d14f1de6318f6ea0e157b01aec500d50f4cc
SHA256160dff6f913755be4080333dd0ccfe775960e91636e849f0e3c83d6159109224
SHA512b4f8d13bb6fa1ecc3f2474039046ea42bcf72dfc5190786d0814abc678f17bd7ccb355d0e57c54b9d4886dc374a60361b4b2bd5562d8c1634f2c0d9216727127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774e6c591742a38248b659750682e4ef
SHA1cb5c5574991d9f62d1181b8d8623a231622354b6
SHA256a7c141265725a1926566f94075cf8b6e7c0f02736ea9c584bfb8b92f160a1593
SHA5120363e2182d2083c60a7d4a32cc542be3cce8b995dcd67b91a29bfa477bb6431f095c5e537765be68a07f9a5b5f085c4f3a315f53dead2202830c7e8baf08f2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b5b6ee6d1e8634f93b089b3ccd679ce
SHA1e2a3aa2b71cb3980c34cdcad073c4cf1aaff845d
SHA2565db907dfa95428794b6c3975316c9d2484b10810fdb5d7e52a5ca014d21c1ebd
SHA512d4b613427b611017043b32520100917c7e14139531756f7de02277a44c5f8463b85cfabd38b54ebc2a8c412a3a745c7729bf4771b07f46d0c27a86aae5b77c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51287a066c73cb9138410e7344d09d00f
SHA149153b894a5b6b4f24369335e1a6150c91ef43b2
SHA256c42277934a701066f0cae4bc02e951843943961d34f450c30af62482b232e820
SHA5122d185079fb7518746bfac09b6b667f672147e33706a81724f8a6738c88a724cf9491972043b6ef768a94f436ff32aabfb768e52a7eee66c86822049cda0b1922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b3aa38b2ba30ad751ddc0cb50ee13b
SHA16106965cd2a297e33af9a79aa2cf59a166987023
SHA256a563531a1b9d46dcacb3cb39cefcd7b49b34c660dc717b374b00207503819162
SHA51288e752309bc9740d4af45c6373214382d62102a3adbfabf824547d99f4c36062cca522ce91c4cdebb7b4f91a130829991628ccec6b3dc11c7b9648521dce9b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516bb3dab8b5113121aa9d5968924ff70
SHA17524a97a9c16f041d2d974942a62a2b2b76de49e
SHA2566f7b7f98040a290eb0eba6bca833d36dca29f405c345966c5a8a3a22f8de7a81
SHA512f55b943b023004cfcb5c6479114bdd497aafd3edae6e485cabe38765a0cb847c797906ca19ed451030a600470ea73edda281167b6d8a57cfac5446436d6f9a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d9c358629170ef43f89fae1e30ff34
SHA13189c1dcb4d3d1f57b6eb7a4a84ceaad885367fe
SHA2565f858a82a90e3c658f70bd358c2c71e0634d9cc323029e19aef7120c61c380ba
SHA51251fa87031a4f6f4b02603e227b5955a25267b0f62f6478c77e1d741a1e28299b30a1cee2d89d2f092e5b390179284d9adf1522a81eb9cfd379655c605319f831
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a