Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
68dffd07c8d22bff6b6b9567d0651647_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68dffd07c8d22bff6b6b9567d0651647_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68dffd07c8d22bff6b6b9567d0651647_JaffaCakes118.html
-
Size
10KB
-
MD5
68dffd07c8d22bff6b6b9567d0651647
-
SHA1
f8d54440a7635a50b858b494121f534813e0128c
-
SHA256
cd2b6737b3fa035ef025103f870133ab96a7b7048c8c5b33c8f2b8ae19fe3782
-
SHA512
1b74c2457d087e1eb0c1e12847fd56a20bde4402d9580280a7b86f62e749816b413ea926202fbf826437b2a5271ee1040ed352167abfa4ebc57f6a7b59cb403a
-
SSDEEP
192:BCl7vFZ7vpzqORAhOlnZPFywOpM3ENWg0nTb4veb2S6bZJU/YR:BEfRAYlnZPFiWg0ngIHEU8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a086241599acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3DE44991-188C-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008625d203ad6d2b4ba93ab049cea1ab1f00000000020000000000106600000001000020000000c6ff3170d6477896f419b150269627b70081d2f8e7d6f40a317234053eba7f7a000000000e800000000200002000000031bc29d50c0301a726461480482305817dc43b69db5db04a5ea595b4ccd7ca8b20000000add84c99d36af7ffd13987d015f84244a3951df6da73248d99ad98ec28fa35424000000017273edffa01e5ee3f30a4141fab98f6e19ee947330be5a0473e93b48897a03f55cae45c8c9261b6d9d30c8a3e83af4cd6fca76d868807cd3035405c76a3327a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2232 iexplore.exe 2232 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2232 wrote to memory of 2492 2232 iexplore.exe IEXPLORE.EXE PID 2232 wrote to memory of 2492 2232 iexplore.exe IEXPLORE.EXE PID 2232 wrote to memory of 2492 2232 iexplore.exe IEXPLORE.EXE PID 2232 wrote to memory of 2492 2232 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68dffd07c8d22bff6b6b9567d0651647_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD597a0cf3daaaed7a811da5ee2bbabedc3
SHA19dbd6902c2077464bafdff3525dafb7d1f962a2c
SHA25620707eaf2d5f706872fe0f1b035f98d0d2a679111587ae0d3ac215659bf80e85
SHA51201cf79d3e853a06b9c4c6fd608b92d018ed814b44b749942469443b1c05d4d306edc405da6c30fa6c5ebf607a0016bcac93651a217693ba6739091f39c04bbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5269e459d34701223a2c9d2f4745f381e
SHA1f3e84461c775b29f7da897238c1a3c1e20871e64
SHA256b3e4b5e9ee1b6270f28347ac09a13f0caa05c6b36c46f49da47cef343fe4bba1
SHA51283c81f67125e321da058944738ba64d685b5308e3fcd983c71570f7e90ddd92056487ef49f67629ab14c3ccbc1ddca2be46c4a3cf2eb0b1d36ca9a5536cbf4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5825ce05ffad364077065d9c4cc7da19f
SHA1f74a3b19e45659ec3016b19d39216c6b2f955608
SHA2569fd10091a4d4b100a2e62fe34aa51458cf1d343c51b6d39b16f5a882a1f2249c
SHA512b7b39b1639c43277b7d65b10c2a47f43505771fd3ddb2d70b5a5b8c6cfaaada0043b4280b24aee34b3c8fe6607cd92acc0315979ec51823b02e9bc52d8a3e1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fff450741594252a13fa3bb22f65145b
SHA1b8c8c4584b6e8f4ba53e5416af69dc4232fd8b6d
SHA256bd41dd3540a89ef83a31c3b0bc7f97200c2681fe793e32c0874749e7642c4d0e
SHA512fc783c72ea578b06a4427d2f31bb13438e80d9a8503ec2e6d584a943fa971e754b7cae9b8897baf4d433e7bcce7feeeb3ef26e7ff3b1f61839357fcac451ca33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53a158a5c0e3d77aa1e75766530013fdf
SHA1af3d5409e6299ecec1e2945010d9320d4444fbdc
SHA256ac770c4471d9acd76732efad5c2531bf15934c384d26e703d11296f744e5add6
SHA51208f561eac1a9a3ec9e30edd796e7d4b0ec66105c2cbf20e18dce86847cc0f981a770af414969ef2d3e7183ffa42d042590b1b9b587a272c78a6af435954420d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b59b038055798a491e099c991f143cd
SHA12e7ab6d68a503037b3e3f64fd099f11a54b468c3
SHA256e543ece1adfac2e7e92df9ba0446c08cb3ccec26431592c3d39b63265116edac
SHA512c0447322fbab5aeb7c27935e9423e8dd0dec6a9780ad76d409a734da701653a7e63966d82159e609b7f3ee6717f804ab88e055d5ccf7a21c57f6f86f6e14dc0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5548507ba5081e0b6bb1a5bca0c768d93
SHA19c7927d7b150f2422dbbb79820baa4d49be59fd9
SHA2563fa04c3cf318282017b4cbe95c0cd6ac1bccf753de65b7794d7ab4b066220810
SHA512169d88bf8948d9468b2571eac0c156387d528ebef7d8f2425586d7da66d85c48109a4b63cb1b402be680bd351b62dc520a126ec6ae78deee2aa45ed4af5a4002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD519d6128cc922736eeb90224ca4aa46e0
SHA1193c8984235d416c9132bb6bc14be7713f35b8dd
SHA256d7d2db3219fa1284dbef0d91e6d3c48848497626125d936242149240a8eacd44
SHA51292cca31661413fadeea3cab6945357ecf991d2a01cc54379b2909bce4a3d98122bfd3686ca450a565f329a216dec27d4c7f4a32dfe67ade1fc08ae2906a125dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52e3168041694fcc9cf23a9e659f9c170
SHA11f468d7184ebf766f9fd12f80e6e82d8726fb09a
SHA25609c88acbe02154e5eb82bb03c4b6f41166d864df3a74dd49e2ea851135d27ba0
SHA512dd5802e92f06863252f8afb7e703db71ffc54eba05f42f1502a9e8626ad9cdd754857d56f739b53d2f1783336329c6b575fc80ac79ae319371ecd5e0418bf9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5987f6637cc71a465db139d27a39fceab
SHA151c2fc143ee9fde7657cfc28e346144977f52156
SHA256261114346b8fbd0e8e758c6de993587a84bf20acbaf0954452d786a92f4a57da
SHA512bd76b8b1814a903c7f601eed319a80329d60cc7c3f1ecc48390e4086602184625b0c3ef2b6706f153aa40bfe4b0c4eaf3acc4acbfeabea61944eda6dd43585bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d5854973190229293f6d3c9ba5939f3c
SHA13268e9282c6b9ef1e78e2e8f7d86b4e290784e19
SHA25682351343d3714887d24b55c207a610b4eca0685475d6111cc644f319757e0a2e
SHA5122c658b588bf1d91bd2590883435ad40e8fcd165e321fe3c736ad2798a21414c2363004b6eaaf459a8cfbd379922aa2b92c12de84c56ea7ea6031dc30325024ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52fa60480070fa75103faee99761e7966
SHA1c0c8934fb9e44fafaf94d34910b6b5d054b65040
SHA256699a9199b9e20256d8bd1ef7f72dc6d740ec3f077ff0174afa08b8b8279727aa
SHA512a1a741389108dfd471e404b90e520f9c39d9636606b9689f87c8770e63b8f07283712af2c3beea6e4e221a5c968db3b0f181082e677e227937b21ea7e7ebce83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55ed7fbac9bc40417cc29d2d384627742
SHA159ff44e61221df96aa0db984a55a816938245fcd
SHA256cce898da0a5033dadcfbe53348ce391433fa3d0ea207ae29a5fa23eb6d3a24e1
SHA512225bfaaec412dcf3aef6eb6d559a2dbe35a79f1b52f4954079a8cde877519888dd85e2dd5b7149b037d29621be2113e9fc0d9c872dbde380ea3740717da9635c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD515f4a797ac55e2643605851c3990fb62
SHA1e0e4cda26447438f10bb1e4626e975c9b418e62c
SHA2569729562d4d3b37eb8082713d7eae4a347badb61dd91de168b3085c09d3265bdd
SHA5127e97b99456a7c88e898ff8c8029da928c05d5ffe2eab836267a16178d9285dcc7f30bda13b9cc697ccd6e30526e3e5229db2bdf9ed2f04ad6e1b6bbba4981782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56db1c8e1f07dc05bfab739f3a25575bf
SHA1af277c7ff04de54fa6aeaf601788dde21c5bb42a
SHA256ba6fbb2aa191d4824deea76887641375cddec0c8163deb710d1afc2c324a6ce4
SHA5126c239f5cdffd9d7048236374171be93687a2ab077d7ef578cb639c7841cd14868acee237c1f551d502e352f49928d9c4be63abd005a59441c32132552516158b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59c8772fb4dfbf97080d0e4486128a15e
SHA113025d5d287df0099299f5186791f4dc033860d5
SHA256ba20aac26713f63207f76e789cc049d122202d5ab78d9c9aa1275b7ccdbaefaa
SHA512975c598f67b6883fdb291977524d70fbca2554028f9e6d41eb935cd107b9b58cd064c7d1a3d226768fd186fa1b856c9ac1f2d0393cac5589f9544742dad2e03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5133c194902fc2e355a3efcf69d14acbe
SHA1d17746d67c38389303c3b8b2d5341ed53efbf6d7
SHA2567d631509edd2e09c025c21697b7350e4fe8ae660771a431ec60f28d551afd60b
SHA5121c0486843f774f014b4ba97ed543cf448f788cf0c4a3511f1deade6c638b7c9ed796e0ae93dc5475614ab858858ef9ad1cf60f1762c3e881b0598dd2d8d6e344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51a3928c688e603a587dac3561d929d1c
SHA133d92382dd552c5cbfbc00c450c4d0596aa35f78
SHA256bee52a7592e0a0bcffdd8cd6c736fe017247a94b633a3680a93f5db795569fc1
SHA512ce70e0e58ea3a1d4726c2dbb6004a945921862f680a9da1d54974d2a54fed910ed4dd6923a3470dae3079f328003167c17f37660076d83e3a4e3c7a0ff7059c7
-
C:\Users\Admin\AppData\Local\Temp\Cab3507.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3608.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a