Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
68e11ed638ae3cdad4095bbbdc37fccc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68e11ed638ae3cdad4095bbbdc37fccc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68e11ed638ae3cdad4095bbbdc37fccc_JaffaCakes118.html
-
Size
180KB
-
MD5
68e11ed638ae3cdad4095bbbdc37fccc
-
SHA1
fcc6cd17d8287724cfa4642a1b0a618e02017501
-
SHA256
52dd9db63d19eae80f63c9e8f64a932da07fb09ccc1e2c3e600d8ba59050bf00
-
SHA512
901bf91bfeda4bab21a2795a7278b4c1172fd36dcf32a6390e2913438fa57e799112a9e8d5fcfad834855f78e5ca3023705e6062d97f0dc7d33387a3dcbbe84b
-
SSDEEP
3072:sUyfkMY+BES09JXAnyrZalI+YB56QGt0+aF:sZsMYod+X3oI+YB56ft4
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cbe86599acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91456151-188C-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000338447b74244ff6b0e9bd91df44b024e7d3697b31f82aa2ef4705823b763bcb2000000000e8000000002000020000000bc9a9b250cd4b3833d4aa7f65373c0bd54fe5ba6e0377a014ed9a2102f7cd8ba200000004af767e5af74a91757113803e7d8009cb99330b7d048991ebac94d73e692b61d40000000b1eb7284779330b6d8feecd49ef7703b2156847a12d6d38dad9e59bab1b4fbd838a50d65fd111a7b81a0420b8bdafb26917271797dcb136d1c46984d32790038 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2960 iexplore.exe 2960 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2960 wrote to memory of 2184 2960 iexplore.exe IEXPLORE.EXE PID 2960 wrote to memory of 2184 2960 iexplore.exe IEXPLORE.EXE PID 2960 wrote to memory of 2184 2960 iexplore.exe IEXPLORE.EXE PID 2960 wrote to memory of 2184 2960 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e11ed638ae3cdad4095bbbdc37fccc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b1a8c93f8b78994c6c3ff4e08f682ef
SHA1c17899aaa74512b9f64ace7a40e01d8004d2fac2
SHA2569653e3328edda8355bbdfda50a0ae2e9e85024974605dedc90dbe9af8d9bfec2
SHA512084d7e92ebad91fdf270ac36d9447691386f734357bf0fa77ee0b30e73a4fa4da738acca871d6455b71f481f633b8323448cd74228755dff14e9e85290222334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c5a2ea653758d9dac6055cac3c9c451
SHA1cc688c344fd6ef89b62e70be2f3cf85f4b8d6d36
SHA256e487917e51601a6f7dedc8ff442faf240d871d109a31ec00839d2fefdaf0838b
SHA512793f45cf4ea9dd61818e31b126321dc477987e9b5095cae1e4e19c79ec6a5e059bfa9c9fbdfd2cc1bb06155863850df2e5c0ea4fbf69db650f6e1df472285fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cf268088684df6c9cf9ce728e2377bc
SHA1c038124bfa13d7ce2b1afd6df98edee2cd77b882
SHA2564c3e348dcf5bd2d8292b640d21a4fa8e8f5a019c04d5098aeb4eed11feb02882
SHA5121aced7efaf1a75de49b593ec3a8db04800ad76545e18335cfb357b6878d6294178980f4dc83ec2946a916e653dc18fa2d05ac8f9d56e49a23ce22470b8b5e63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da31493308013fbfc785c43c307b1088
SHA11970fcf54313ae265c1e5893c8de0a101617f6d5
SHA25602808efa39bfa0c931e8fdad3130e12e32bd49ac6c251dd582281bb975c85ce5
SHA512b14378f3644da5d40fcf0ba6320ae14a3f523e0ee84f3a263b28643e8d17d5c4ed2ecc44304995011015ab4f1c96de25378c8d54893e3d511f4938057ad178c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af4b365589bc318cab3f96293b0b3a8
SHA17f626fc6b0abd620342d8eece8a617af9613bf2a
SHA256120a3ad376803c2c45157cd1c767f5f58f882d338d7b72c874bb98949f32594b
SHA5124b94b57820855b0278d2dd548bedd3f2848131748c3023b5cf4518b8940cc2eaf7f72d489346ae7316907d3d840ee126fa2ec1bbb06a7fcb72126fb23950693b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564cbb9ddfd3ef88cf0a7b7b706468687
SHA1d9b006c56a76958ead1f298151375e1d7860a843
SHA256f03e883d3d8249b6fe8c94e54edff504374562b280f0ac52ff57dee290fdc288
SHA512c1f7acb5af27c3f22bc5d5884f91a4df9d612897117d078dc7b1e2eed8a299c1200244976cdcb80c7c22cd2b3a7103bc8a15535616650b6b7bdbc58006451e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7350770664d93e2a6f1ccb1f220430
SHA1eaedb109edfc5805f664ac9e5ec4ff52eeff1c71
SHA256652cb497c2927c4c66e65e9ba9dc9ba8371448613776b0ace5a45d31a7543fd8
SHA51282303627fefb99acc63f3e2b4d46b0725d023e6ce0b3f0ddd0a3de720bf13b2d098fc1dbc0186ddcf84700e1e4bb331d3b73fdc0b6606bc24d9f563d85dffce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a20c8d92c5a2ee80b6fcd2dc7ab66f9
SHA17faff9950342db8f571c0832724dadea7790abb4
SHA25605be3898145d23ded005399c9a48098151870e071a85f1510ad7118c12735eb0
SHA512fe101c9cd3c092e14af3cf392126626d034504766068470328eabc7dd74e342f1efa303d6ed95dc75e2dc93651bce270008de0e392b212151ed682dd55703d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda0d6e118cd0f290f9d56713452b389
SHA1337dbf8d14b1638c768e1b56b9c199c32999bcaf
SHA256f0e0dfa81f4f15d2823715ee995d9d3012447699cade9c76032e5e014436e2d5
SHA512c8160fcbfe4789ce77b74f67f20fd327afdcbad5ee2a2ef6058c0c63631220b7016c0ed500c6ca4ef1eebc52b53eb264539acdd3c20338d4807310159b4f18fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f4d491577b41c2c8768a596a7fc433
SHA19ee6dfb6b3510261987b3c3c934873e6fd84ef7d
SHA2565d67cf05acc9f999ce903ff63dd5eff8badddcb1c38337af7445335fda5c5dd4
SHA5120a5a9fce315202ff14ed38b4432bf931d28393d94f541ef29ca7e891188a1b466e676777777144062e9c46140cdd5c4773091268186ce39ab6dd0050a065a510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bdc8c58d0bddbc3cca956501030c086
SHA155ebcfcac8dda50bc6931bb46701219836a8e893
SHA256f6ecc13c6839078a05e69d8284623eb9b065b4c4c9b38112a50fe52c2b779ad3
SHA512e5daac2cf8879b2425ef413340dbe3382d675ee5e54e53144dee93d10e6fdde90270bea07dc342f8f69c726aa2cc141129b0108c6a19d1b2ca279360b926c072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e46b123da42780b5d0f130d3f9801d95
SHA1a96d049c93bc7841cba940b0bd47beed3c7b7713
SHA256b0ae0d08f11a359c8a4b1a2e798fe908007e362d210cef7e828abf897e968b2c
SHA512157323873371a785c444365dfc447fef9063c445afef91ac70fef73bbf2bee2b610461e85b5b01005afe61d2d2138a2c49a0bc8808dbf9c22457f257d78073f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5928c194f28d560ed13cd708401c37826
SHA1207d8d6c99e627098dbaf50a18e8b0f493a4ebbd
SHA256f65574ebfde59b5476ac66989191d05cdf939830b5e16d2ca74306348a52c135
SHA512ab001433b23598b365d62f0c07a837e5682fc4af55ee5d318d5820456559291c972c566e7d1e1777881bdda69f737ae8f57cda35b3b8582332ad84f17f25ba99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf3b37f6f46f75f5c60aa7d139de4b7d
SHA14619fde5fb999c538ef0de42caef2039bf297440
SHA256656c8d3ecfd7b32d98f324979112f15e296ecf04111c16bba3d8af976755262d
SHA512e2eff94e325d0e196036059c643144465ab32d2258d6d04fc4f686887c338d99ded1f1bbc2fd6cac42e115f1f108a3a4321003308278ff3f1e053fe8f2fe37ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec0bc0d9ddc356e20a678215b2cf7474
SHA13e1d01736e6d1a3a09476cad89c9752366665ceb
SHA256e695b439eca07b6da23080058bcd156bf2c338a2bf4e5a0d68e6753f61717b91
SHA512456650ce94df5a159084088e02103b6a9be5b7c384060622dbb36901b31cd9826dc9931ef5af8f12effbdf9a0d24328ba50da9bf6bbd09d165ea448353182362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511badc1af02326a68438f6eb45571315
SHA17395dcc5d893a16c6d1415e9c19d3b0e6de1f8f1
SHA256010e45e34fa7e60150be06ec48bdf408a70b8570c081b940d52c602f1ff8b506
SHA51211bcd224719496d654a86a17a24bbcffd32d37e0e979f3abe82fb2f860f007e1f85421ef909d3eaa6a8c6c8488aa23c4985a480d89c53a02e2ee0922b5aa526a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bade2a249fd38591350714f8b39cb0d
SHA1d6ee57defba0917d4bf40799e88a50d209376871
SHA25664dcc5b69febc71ed2cb979ad151fe724943fe43d5f6342618325a94faef7a50
SHA51263e51ab4c1e472ba66e9d9211d5cd3b0b5b06d331040edd7438241b72b630630f97c807a62d63977e187803f5495b6657cd6d8b56578992cc5b6288f0f29e833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a71cd3fa5b5d588163e82479cc85f446
SHA10815f7dbb3938280b94296275b4d02a301d62256
SHA25612a970190b216773db9661a10c3b609844af0903c5691c9233e6bd41773c123d
SHA512b9a7658ab5e39401e9a23a2658eed18b2f027c648e278e4b3aa0d78e9a4544abbf3f1dd8a1172b08ef031f34a6dc055e11573f7d361575e8edbf71f19035671d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a