Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
68dc569b8ec1d77023f06fca06e21e06_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68dc569b8ec1d77023f06fca06e21e06_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68dc569b8ec1d77023f06fca06e21e06_JaffaCakes118.html
-
Size
16KB
-
MD5
68dc569b8ec1d77023f06fca06e21e06
-
SHA1
209a1a762df72411cd8fe61a64f3251e8f76e587
-
SHA256
c1eabe48be3efbf51ea1e9c9390015fdeab69b9c3ae7c5e7b9acaa82f91c7049
-
SHA512
514e6b4f2fb0c9d13aa3f657aa497b61d1f3c2ab27fe6b9ed34736bed2b808a684d8d8396133ba34e61a147e573325d6b82ba97602944031f09951f15c3139b1
-
SSDEEP
192:x60Ua1HCPpNmr8x3qgtvW/OrUjLsUCR/tm/G/ecaWxD6kDK1jsVNOkdzldlQi+UN:MJPg8PlG9tjsN+AM/a8jkE+MAEM
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579051" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40823AA1-188B-11EF-906B-FA9381F5F0AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000096e019cd4330e9c5e00f815a28728695bd69b9f54ccd134aa8cf34658ecde95b000000000e8000000002000020000000a3908248c1a6986ba71bf4ed7751a00913f835f4ce21b9cdd6973acd8f2cadaa20000000f186259630573143a56ab929ad35c7ce8daae2786e7bbb67a9f81e203c3fd7554000000003d9b7f98d2c4cc8d5b03805f3508e6962ec2af6f02804611e68cbd6c6c14b27f44659830e937050c7044a0c21b27345c9ee58f24ea9104e4a9f6a92f855c9a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b5d71798acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2480 iexplore.exe 2480 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2480 wrote to memory of 2252 2480 iexplore.exe IEXPLORE.EXE PID 2480 wrote to memory of 2252 2480 iexplore.exe IEXPLORE.EXE PID 2480 wrote to memory of 2252 2480 iexplore.exe IEXPLORE.EXE PID 2480 wrote to memory of 2252 2480 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68dc569b8ec1d77023f06fca06e21e06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857501d8bccce8085644c796336379eb
SHA1eb9e29d0ed880879be566cb72cfdc2b9308adb76
SHA2568d3160d567ea705a7bb2285c0cc5fdf7936e5d7152f262c282e42377f8839311
SHA512f1301be5489c9f5e180d7bf3e97b6e81ea18f6e3a7365dbdf793fec019e76f13aeb5bb899b696df4a1f9d20edb102fdfed6ea23a56238d9b72a705d250decf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b3cbd9e4b42e26bc984fc97c73665c
SHA1d4ca38874303af695174a93edc2ee66751eae70c
SHA2569d50b939a64fbf8bf15119be2265bf3f184f1e5852f9b4373e3dedd073b4b5b7
SHA512a3583ed48a90bfb6e8968211257a1570b6a5c620cddee21a726d9ed3fea814729f4731b530bd4294d0dbe2e912085c8c49779c14fc1bb6ca6e46f5dea528bfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a085716ec331570fa72764a4c9255f3c
SHA147ea8668f51613eafd934663b196bf30a033aa1b
SHA256341d7d21c2d4e67e15a392c5d07b77ee71697086c52b01c711d7f030398aeb4d
SHA51290a7839f34072878f9f227c74ae757ce4f63a91dce135aa8e625b066820948699a4d635a3cbee481a66256edeaa88746e77cf24322b771a44495455dbd7c78c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579cd10d6e558223c324b39a89e93ace9
SHA1f768c2a6016ea55bd5f47b07cca875c5bfdae65e
SHA256e64007ab166d7a4d80b322faa1b6bf073643484e9ed4987f25e0e9c2030d425f
SHA512b1f77ed467052050464c9b52088c8783801aa34451e420d0de1cc5b0046c8eb8018f0e7f39d1cf8a864e5fe0c7b7c10e75d68f5c2022a7b5e66c9d5b937f0907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffa09429f30c046dbfc7d62b3f3dd0d
SHA127d89e0a31b3af784a86fa42c00c8280547d424e
SHA256a5e0d8498e44463a7a85c50d8f9e520529bdffad75c77df007c3d16e2f32220f
SHA512faf7521ae8cb559a7104d658148f7ff37d0b502dd202a041077eac7c7fdae761b43fba18eb71fa6a716ec2bff742c9b08c01d39dc8b87dda3a729810d48ee27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5447137a67ff52768b4d3afb09f09f4da
SHA1eb074eb9d8b22262e3ee7cfd471ac5e904d86be8
SHA2564eab82b40a0f404ba56d5589d3deb27fb69409f2916a10d340fbc29183d83852
SHA512d5750d4f153e6873afd7fe2b80d48e7e5042dadf20c3fce79c71a61d96645fa3f3a8d9a67bd6683d8a012540286aeb047a909f92ba2160dcc7e0b25175797bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529314bcc8c69501798ceff20ee1b7afe
SHA177a887fb9257c2de8069bf66f9ef4740e1c1f378
SHA2560b5b280f2ea4fbc0483ab8e481d9d6bc83c111cfbbc3947d4f3fcce98f5dfad3
SHA5128a71143374abf8fecd5d33deae61eb48109d978cea49d2f6b7a27b746424e25c809d6ca08e0ba15e13ea501dc31c73c61c2a257bf5f38eed5ef1acb7191b5746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291a7300f80a35c2b35daae0722849d9
SHA19ab9b96c5e2bf2a6cf6eedc16bf1f5f188b012a5
SHA2564e3d46f652dec517c77ad20b5f12cfdc96f2636812dae2ebc15e88dda63373bb
SHA51273bf1f921d4c9bafaf813c559337a5c5f3116fba54c71e5e04939e770c7bd16d70a141978fcc655894a70a431048911300de20de35bead3ba8c617f64faafd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b69c6572cb3d1cb2ed5ef1de69b83ff
SHA1baff2f6617af5d631a9f9d5e9270eeedf37d9526
SHA2567698823aad1bd63a0a3bb9d56f20249ab9c19aea0b6d235e1c775af40c25be50
SHA512bbcd2181ba815d961a936eb568f8271ed9ce9e163e2527f272f0cfea184e8dec2a54f46a8a04c9d7db5764037f48887cb33dde3139063688b2594afd209edf02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9134b6b04e97e40cad2e5af30b0a392
SHA1afce9cce986f17367f4e065699ae10e61b3525b4
SHA256818582915d04f35db4547633d02fe606755533b61313953aaf5544daf9881ed9
SHA512d5c0921ccd0fc5433a20b185d1e05f3ec8f657eb6c95d27aaae1b028774dc15534f20cbe131c8033a3cd9aa6c53b6ad03c0f3ca4068a5e1e56dd09cfd89eb3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd918ac97256f0d17c3c5cfe880b61f
SHA1eeb63e4b073eb3c367e24888dee3f25e12148780
SHA25615bd7c31fe646ab396acc38974bcd288e04bb037c7e9ce5509c1d52eb08d0643
SHA512b36d4825b43de063c4a4b77e5ebaa6fec947f2183308a31cdc4a681084b9a7cc948e8fe89568325069bd9fcaed67e27af238a0968a7de74e4e4e286d7b8c8fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a1da1c257c8213aa5db25375990b4c0
SHA142ea66ea908068ae71ac714af487d61c6300ae8b
SHA256735278a8ccb4234d2e9554c1adb27bec6c769fa5fb971a20323e729bbbf984a2
SHA512e16bf6323b7d01d5098c63bbe10c56d77f567952d3fc45f5e8c8cbcc5902e724e8fa9f4f78fc0d468ec3dea8d23504a4b7136ec8f96e62dee9cc4c5e61ca853c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdca69c12622f8a2dda15d3a3043995a
SHA11be59a88216af7c1aa456bad9c34edbd03184dd8
SHA256ed991890ebfe02348c12e381cc79d72815b87fcc9e3f64564f082759490cc90f
SHA512462a8fd1345a237a2e1a479391e6251b91826f80f2f0d34782982dbd5e84031c66f9546c5978822dc1318b3807c683e7d6bd39b4a97faaf2ef7bf1e874ffdb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f19106312e26fd7d684019543f596599
SHA1f3ad5a6ce2392b4542b977f3afde42938c05d2fc
SHA2565d53bef7f640b82ab16807d5f8f7655fc887143cdfc8ae189e477a0a174748c6
SHA51284fcd3e9cf2a53a0aa8cc7f0bacc7b715bf7f34a49b38e91a6528bcef1c4633fcf2653a7aa540e241a883d2c6dde82f7fe2077d3632e45d3e990e7fa442d6829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afa729dd7761c27ba9d1f8ce8d949eb5
SHA11b354d0c562c03274d17d13ba4e3bd13c4807312
SHA2562a79352af90d019947db4d937d87f00aeb8dba47e8b633816cd6e6a613d739d3
SHA512cf09fa57608781c6d19e511173b39df55ea686535df431ab25cfde0a853847ad0386fab24b01f85c9e85179042669d5ebed4e9630f57c42921711d363a3b0cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52681aeb9743108a15f41be755845bc37
SHA1ccfa37a01361ab6d9c8ba2053e5199c025836cb7
SHA256462bc08d3bb0c350b6e3ecb7960ad70fcdf7ef35f6e2235d5ec9cd4f6882d1bb
SHA5123b074b8a30d2a46f7af74572ea71a428e398c2000083c9c986fd90b86a8d7e6e1b4df2babcedcdfd3d76784f509c00842735f719e12f526b4a5fc4ed21008808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b6bf0c1da0574c80292931661d76aa
SHA181a661dec288c6fb396de77e1da74c571389bab8
SHA2563ce6313055940b90bd56416911c6c5997fcad3c25811c772119789557db8e2d3
SHA512732f781fac90cfb4eb4e44f686444d3b4a2be9443c60318d3bdad12f682dc06834e790c60e68be4246da939a2d46db24f5d4ed41068aa506c4e595dd6c95ea7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508983b3dafc2049406c5163c1eec91ad
SHA16e4658eacf572545aa854320e61c35c57aac1c8a
SHA256f0263c3117351848f88bc6dda1fb260bb466afdeffd403bb640fe379b49762d2
SHA512173b3042ad0640ce740ac40ad926ef64ef8b2aebe388aa02b0db56a71845d7fe95cd9c11147e7455c906cce66fd5c5d57b572f23a726e7dc09a8becb4db3ac99
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a