Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
68d815956439a26cf006d05668cc7bee_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68d815956439a26cf006d05668cc7bee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68d815956439a26cf006d05668cc7bee_JaffaCakes118.html
-
Size
213KB
-
MD5
68d815956439a26cf006d05668cc7bee
-
SHA1
b9e26aad27107ffd744a746bed5282928ce3699d
-
SHA256
bc31e4bf269d4bda5f6d5f996d3b9a8a5bd849288c65d7613457ca3873c0aaae
-
SHA512
ec1b4740737eaafa6e1965d7dc935b086fb1ff759f8b512f25cda745a858061ddb48c804a6018067b235cd7ef01713fa282a9ed38e3d958ff096b10cc47ce654
-
SSDEEP
3072:S3Rzgas/k+ehyfkMY+BES09JXAnyrZalI+YQ:S36AksMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BFDC901-188A-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1712 iexplore.exe 1712 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1712 wrote to memory of 1584 1712 iexplore.exe IEXPLORE.EXE PID 1712 wrote to memory of 1584 1712 iexplore.exe IEXPLORE.EXE PID 1712 wrote to memory of 1584 1712 iexplore.exe IEXPLORE.EXE PID 1712 wrote to memory of 1584 1712 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d815956439a26cf006d05668cc7bee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5057e6635f0cf02bb693f2d5c4cadf118
SHA1a59fd4848ea656188dc7809aae9e24bf3ffb710e
SHA25681e027e28c18e92e96c8f64c4e02f6d930c78e8b3fc1e2526ad6ccac86587656
SHA512fd4a6ab8fd39e698ba250965241b76074d060bbfa1caf4cc4554848ed232aec276d877735c47ae712a47122527c1413a26e23bad3429e3f8e18bc1aabe5416a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a45cce642789e8e048d982098b7c336
SHA1b8c2a86cf787ceac28b86151c8eafb707031a441
SHA256b19cc8e6001906b1e13a990c1099e89613c0051b05f9011febfe635a4b5ae2bb
SHA512ba6776c7ee4fcad0632aed8bce1d39bc44ff79cadb9497b7bcebb9b61ee32dfece6a0e7c94574a1ad3522f1b328ace8429b568e59104e302c0ef7eff9b5937a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533bdfeab0d6e532593788b94bc60dee9
SHA1feee8d85c3376066dc13a75ac985280e44a723da
SHA25677ff1b83ae164768a2639d6a3c796e66d647827d1d1e5f46a33ea6e367d5cf92
SHA5127064b9c056c0b2bc3f2ff3477e2c590a2251c124456769c511013de1749aad1f6797c6fe6b56a7742cf48158e869f27855065b863d9a0be62e4cc3ab3649767a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59412c1575cd47b546aab4276d5e02a21
SHA15e053167b72b35e841672cccb1fba70f5f29643b
SHA2569a82a98c050425c66852b62231bb1592b11da9818dfdd932eb71d53a9b5caa82
SHA512fdbb8355f074e60fd7aff348d124f9b6446393265f1bb7a60e45e095ba22f95386a87ba551963a212b17b1b18cd9c3a36ab5586d2bbb930ed1964fb026fa5fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e45d6b3ef0630cadf7e6896c2120bc
SHA12f1e79bb292713b841ded31f6bb04a9f6b1fa352
SHA25668cdea712483bf4eed1fbd444276bb95ad1d6e42ccb2d95c1aa775ccc9209a65
SHA512dc505e9610059d6095cdb05525d78033534ef645876afd6e7a1815142454729b84f3a6cb616d405285d80993aa390f35beb95462b6320b91a0232b5fef1f79e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82212f5896ef94172fcd53984bc9d4e
SHA164c534aed3d36a885e04332cc7ef835e1d2a56eb
SHA2567bf1cb8554be97d7e5c723c226b726356c59c95e6a8527455758ebb6ea16568d
SHA51291b7f26b5d52c819c45d84a01f82f28d2cee732d49b46f738222d799530fb33e5ba947cdc682421e89a7a0fd8464ccd5d8b669bece823d4c7e90515e1c75ffff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd9e254883208c301a04e1e3dd1f24d
SHA19e1bff9ca5b08819d4d8a82322fc7a3e3abd9b43
SHA256d344800c5d2b4492b0eac1debc61c0c45a48937620a7aece6c1a6d79896416ca
SHA512a5c2ff7936bd2bd474a00750dfa5d3620f87e407c70e2df938a29fabf2468ae03df338519b32ff87bc9c817ce3f12691ab9bf4810b2e5cd40105ad19098502ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba6ce9db7c0edadfd62b66332fc24ad
SHA1a43a40f788e5121ca1a56e2e5b38f1da47020933
SHA25685f765640c94bb84f6097e4c25f11ee85f5a576910aa267a0cee81869053ace2
SHA51249afe59c6e276e5177b73e774323b2a9d76cd4f49a646af9f8156c892008ca63585eb04ba9485f00fd6710fdd42ba7019b9851fc994c547a910a07d8d4783e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fc20ae97a0dd262444820e198f74d9
SHA176d0a768a0d0f611f257c2524242b97416a71c8f
SHA2562abbb13296e577771eb9778976f7ff143e3b6734862adae464d3fe3b8ddf88ff
SHA512ed06138fa17eb3a99b02ac7df33517ab9acb9ad985e5b778cdbc545663817f8205e9a9afb25a9f31e83bd095a9bc41b4e32212bcf17985083a5e8f50954fccf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502abdd6d1ce7089f70208452e607f7d
SHA124c5da7ce1db1fa0cba8b3299e139c03a59281b5
SHA256e807939da534e765fd2b73719300d0747570a094ab9473f37b4b187c8b6212fc
SHA512ab8590a7b23cb64d74000b746ce6b2483efed8b269fd926202ee7cbf0f998c0661e0cc8727fd7330beefe939ce63f5d3410b013069a7a0240c1a835cdc7e9cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5147cf2adebcbb17cdf2c4ca4791aa7dd
SHA1bc4bb8fe50898799a517a12369ba0df6fe56bf2b
SHA25614205a3b527f656d4d294ff8a0d3ddf570adda3c825084b95182eb3857134b4b
SHA512a696fd16faf863dc3c08e087e2f74d29a8b59d0d5f92dc44ce1985f4f306dd8f6114c8f633390f84d5bd9d5cc6822c7a15823dcf21923b5d11e0d17e59e0d320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffc72e55b8734a04d40fea68d63d691
SHA16442eaa0ce7843efa493296070a8496f19fdabba
SHA256035ea81b00ccccfe288dc509b86d1c3456f44a4205581e770f511952fef0b636
SHA5120f1d9cdbb563a5661c5fea1983d7af4072fd0af303b10d2ccda3253794f34a1165bd0f02b949aa9c9cbb50591a6a9bf6c22e33c91bbe67f1c5cefc94383bb6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b02391b3b1a76c2b71b21e4f81ebb96
SHA13802f3e51c8ba5f4e54c705ce34c4c1d17a7072c
SHA256faae24435b276f4a88190b5059253f03d18379c4cb569daba31e95b3e5a4748c
SHA512660d40952099f4ee5c7aeac99027a08257a2bb7a43ab10156715727d2314dba1f54a47e956919f0125f75f66dc45790141eb2867926c9aa179839fa60d65db70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596364777d3ae089933dba7a2dbcf180e
SHA1f20f84fb0ba8290d912e767b15fe6968d932a0a0
SHA2560d97ab61de2838e6c949cfa37125695c3fe7a28aa2951db4e8a06d81acf04994
SHA5129c483542dff89ad2bcab9bd3a7d52093a42538ad312174e48732ad2e4f67426f8755f3fb9739c424ac6ef5f18840e4d35296199fcfcd7856af8fe9144f49a9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df82d5e0ca6bbd7a0e9173a5abca4eb
SHA18eee9f2b73661b47c2701994bdfc7ed9986df23a
SHA256ce63ff3be508eed04c47b8671769eac1b58fea4685a8854fa37d2cc70e374cb2
SHA512c7619e3e97d11c72b314db2483a6151ce8031d201680391a39ea76f3b3c7e873b58327344dca8765e2b299e2613b79a802ec04f9058c4f35514d3bbb05f78359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a2c21052a1625906123fed2413f6a4
SHA11be7e610b2d2c934749bdf4177927850fde4d665
SHA256249a7bc90740a610efd500c371e0baa05c4927c01fe428d5be9ce6da65208ce1
SHA51287f3ef38bf49b3a11fb59a703238851d0ee10784c13008bf29f676fcddecad549d933ab0cca096dce699662f9bf188ceb596aa18665633b43c7cfaf80dd4da1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c512af1cc506f33de6b3a4a078d16ee
SHA1ccab211f617e84c9ba518cabb0607e6333143c1a
SHA256f30baed2788a06918ce3941e0c9f534d67333a863396e74113086620081fff98
SHA512cd51aa5e200fb026f277fce81b2af0d255deafd1e666483ae39cf4e07a9915e07ce59183d1a3a11c2fedd59c78163bf20029fba8c31963f07b0f27298ae3e54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba4549134ae390c669a178c38c561c15
SHA1e53643c8e27db8110dbbc572bc46f5d914b1ddd5
SHA2566ce5b39165d8680518f1b987060f40bf3e1a5d0bdb2a52a521a1bd372db65a91
SHA5123c4316a2304b6d6f3858101d967603366c8d590071657fe7402bf34b009c8abef01c897cf2154bc707ed75cd303643a0745cb846e26d6972e0fd379d3f4eb8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b720ed50f19c87b6bf9aa8d7345a4f6b
SHA1b48b7e880173662efe22a7b5300fc265d906d1f9
SHA256110147da1665b5ef7d3a1eab801080c84d1e6cba9fd04939ab48f00a3d6acb68
SHA5120e944ccd3acaa95611dd6c1017656a5949cc82f922417f5bbef5eaaa12db3fcff956776bc2339a1abc36c8d0bd7d1acff0c3903e703f130ab5ec83c4409bb484
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a