Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
68dd846946535f08dccd987ff2fc2c4f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68dd846946535f08dccd987ff2fc2c4f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68dd846946535f08dccd987ff2fc2c4f_JaffaCakes118.html
-
Size
674KB
-
MD5
68dd846946535f08dccd987ff2fc2c4f
-
SHA1
1d42f33e84efe1db4f52b9c6658383cd1ab27d74
-
SHA256
4d5c0e6316826dbf95341ecc59c210a898a509790ab8504d2447f13083aafdaa
-
SHA512
78122c1ebac4815832b26bb400361d691e38ef90574fd88f376955c42ef9c3edd7cf798b5474d778aa94765edc7d3e5f8af9b55a9a1b9a2c8e4f334aafb9bc0a
-
SSDEEP
6144:psMYod+X3oI+YJxxsMYod+X3oI+YTsMYod+X3oI+Yu:15d+X3jx95d+X3Z5d+X3g
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C1E1611-188B-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2097b58f98acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579151" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008869162051f8c386fe9f18b939371f29804b226c65a2045331d440cb3bf8834c000000000e800000000200002000000011ea848112f58b6fcba25c4ab16c5e1de39bfc6e60c7c253353fafca3638724c2000000080d0a3c857353abcd1f00db015a629cad2cf8f396ed22fa19110c3c5e827db1640000000209208552fc11725b9d52e37edd0f6ef1c19b40d943c3851809e45da46c8a9cd633ff94e9403afdaffa47c857bdb931197633ce551ad2bb9147b94678a98abd8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1776 iexplore.exe 1776 iexplore.exe 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1776 wrote to memory of 1300 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1300 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1300 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1300 1776 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68dd846946535f08dccd987ff2fc2c4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e64969ee463e145203fab401f9c7b02
SHA147b9c0491925573547e2381a1513ae2d4f89db2b
SHA256a5f1717db3023103a456de0c911fbd4e807931f9a0f24a8638da786e40b38978
SHA51256a076d8386ed787d0c41cab2d6c9dd1f2810bc6514919439b8f642da6fe76d97ca28b5f408383602f09a4b7097eb665d9d04b3fdc2a4244f136d135e94032c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c218d68cdc06a808ef880b03fee394
SHA191c1a41ec699a30ce88c4149a78a131696f3a2f3
SHA25610ebec95819433560b1af0a79e5689ac4786c52a20fa57efea8923db2d0ed964
SHA512ad8476c6ba703db57021e47f54508f217d0b34324ea07edc35ba9820ae1b02a43a26e3de72d30c577100d853c63f56faac86fa0606fae919c3dcd96ffa8c648f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7fffb4348002306212acae0a2413cec
SHA1dd2f3d93f1ed640d03914ddbdfc3c9dff2d10191
SHA25636791cfb9d270fd4c51fd685fc519786739d32e5baee1f12eb68ab8ed95980d4
SHA512f7bbefa6e641e7d6b9d8bbb90b300ef912c80f9df65dd4640e5615dd45ba96e77aea4d691d4855566b8cf6cb2b227f6df5a073baef4175cd4be9338b86c3e309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffa5cf1d86daddca71913d7bd96c2f0
SHA1203fc58d84ac70d1ab06dda480c2f613ae8fd9e6
SHA2567f27fe0a42524b2dbe9870900a3a964e1266fc8b0093214f5dc46c4cc3c44697
SHA5127c7b3f3889984fb323ff24fe23c0db722f354e66e621c7de9860e093e476688aaf414c246c6a9013340125faf53354a0fec8bbc8f971b3b61a7a466270c8cd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a00f1572dfd3d8e540809e28337143
SHA1ceb8e7f2958fb6f96fb3b2e02687e601c5cd05cc
SHA2561cc302c4e758c5580f650bd3926a971a7704aa6d1af30f656c2d3200d97a93fb
SHA512ce902c9b37157192e8d845a5c23223e6b4f5190921522e10297dd6a3f0ec7093091173ee83d2b6e853753e82fb15845acf96ab3211f79fd076a34f691a44963b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d589dd40fa53a0ea03cbf5e43390667
SHA1986d0a71886b185774ce6a0fa817038d2cbd9c6d
SHA256a3fe42eaefd3b5989fb5c80e210641ce0641365664a2f5f5eb93bf419f98a672
SHA51214d765f0e35f2b37b9a7db65e96f3ad4ca0a012dce5a304065b52635bf8de41bee7adad1d33406972b5428094cff154db67970473bb6453d6f46d70da01bc210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc6717440c6400a9ccbe1a3b9956608
SHA1abb517b35412e6d114aa850315b5ab61f15957b2
SHA256a7d7b93ea64c6af8991a24d38f624f79f3521fee194ddeb5432e853563cc9d42
SHA51264eac56161164503f0b3e5a159fd6d03136e608dafaefdfa1be94da5c10730651d35451cfff90aca35e2c791d6dd9188c5435e27fab96496d3721232bc41e7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da184f1e753a6d9647733b99df9c309
SHA17a240c67c726eb618e7d7f19a43d26588193ae50
SHA2567e318bb8d3f96464ea9054211778ac8dea2e56905b19122d7a9688ca4074e33a
SHA512f75262cc4cf6fffa3509e38e553cff80264e98ba565be2e0c86598bda4c38ae87ee12160a55bcd77b9fea001ae825f69b09c6438fa050ac8c700bbc3d09b5b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb48874c952516d0e52d53660e9ec68d
SHA10962ee30763744cf3d985264fc020d25606a6803
SHA25651e129d502114636f4b71a670065398268dc572d0513a85d7e733b4d48aedee1
SHA512f330ccbc345644472d0a639a1c72aaab70e711330b4520eedaed8841622b5883252f2031f185af81357a766cdd147eec5dc1e466cd2b78905016d12823e17df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0a729e9c5cf7b00e23b7355b8a33392
SHA11a1a601cffd66c6d44be884ce3cff367f1e498ae
SHA2562408615e7aa8ad638ec7380607fb45cf4799336d47074c13a3320c46903bdd20
SHA5127897137949611b94de3fc4f4e217799ce6774fb0a63cd97fae29d0e2605e7db0d85dbde8a311a12d0fc6d6320e4a8d0c02d29cc7ff3e4a0f7d0bf3230a815d72
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a