Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
68e518a30417e4ffc6fea96ba4a8a937_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68e518a30417e4ffc6fea96ba4a8a937_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68e518a30417e4ffc6fea96ba4a8a937_JaffaCakes118.html
-
Size
182KB
-
MD5
68e518a30417e4ffc6fea96ba4a8a937
-
SHA1
be341d0f6f26b6488c92a591ac566166c28caa73
-
SHA256
26a44bbd799eafa9bb86b45312442f17f1dcd2a5c2f586414f6b187a14f9df3a
-
SHA512
a8da7ac449dd7067d26302ae1d8cadec205b21cff94a86a5e985ee5db019a1f3b0d159ff222904846ea1e59d7e2087af1fb28bceb0f0de482ef07a70ac5c722f
-
SSDEEP
3072:Sj6yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:SjfsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48D90BF1-188D-11EF-972F-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000426c0c472d21dc45a9e8c0c5728fca7d0000000002000000000010660000000100002000000022143cbe8d789c42638eebba20d4a3cdacb7031d15c3f33040b73338570f6a8b000000000e8000000002000020000000c375c71ef1f9afd7a1fe2979324f957bb0e792cc7de2e05c8343f6078e064de020000000e3cab1a76a50c7e3c93382de8815e612f1d0191d7177faa79d23903ce599faf540000000efb29a558cf8774fb11633b226fd9f34779c92c5c04091e4ffe7994fa83094a409c2e04e0d48702d19196c7e89f7b29abed16a546d3cc86b5c3b3f3b727debc9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c4cb5c9aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1940 iexplore.exe 1940 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1940 wrote to memory of 2628 1940 iexplore.exe IEXPLORE.EXE PID 1940 wrote to memory of 2628 1940 iexplore.exe IEXPLORE.EXE PID 1940 wrote to memory of 2628 1940 iexplore.exe IEXPLORE.EXE PID 1940 wrote to memory of 2628 1940 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e518a30417e4ffc6fea96ba4a8a937_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9876a88f4deabea8974f8a89fdf7a6d
SHA1a450211b8ea4625cd1e738be60ba27a0cef7bd3b
SHA256769e7f4244b68694b07d6ac8f566ae29815f5dbeba3c0d9f49dfa2d2facd9ccd
SHA512483d05559e52bbe1d95401ee3aaf313c0156dec3a1226bb5057407ab21754e3ec2a39bce432e201df10a76b3320d7490694dfc15bb0f5166b44781a9068a343f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589788f6f6e7f5e192235c2051cb418d8
SHA170d05edaf7de6ba33161b8c484053e6dddd6a9b8
SHA2560cec134f0f73bbf8c7d3e689f22fbf9b085aaf6d6904c409292bd0f5e183f797
SHA5123867aaa69fb4fa505275ed412177ccb98f3c95bc6d0dd40ec4d7e03948e60696fcd362c5a3ec1e67a96faf21751cfa17aca0d937bb04918fc581f4195f126ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ae0694cd3507b6f326d65735bfe38f1
SHA1e186e8590c6ea032af21ff6041e1028ba425e757
SHA256978f76aefca24576f0a6cb754a640a3eae7990eadddf52f6ca286c2b17295c47
SHA51273e6181287691f908647301f82172ddaaa8f61ca3e16594d5ad24597166801616d58e67e91f71f2cf59a0466b89d1c45a5de0065352319917933f6be65479750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d5d1ba8e7403e27fca21a0aef65cc84
SHA1df172dcdac6037cd63162d03982a9a6f6e384698
SHA256448d4cf16d3fc7c3b5bf16c235239173c162e6156e25f7e47308c9606c3bb1b1
SHA5123ec3b44c75a8d88989551608fca9adfe04d697c8214b054b3d6be84a0e2e5844a64bf65c0fc75a82d16f9c2ff4a6f4bd329922a4d0732928d305f4b040556b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64a17c01bfa0dd425ff0242616f342f
SHA141824a9b04261048fd1b63610f9b9f6817d6152c
SHA256e9d3611f254cd0e01ead872afb212b23c91b7f414ec46b0e5ce768c533c6c498
SHA512ebeccb8029475fd14f84a3dd1ac1b56e1a6aa958bf881e3e0d1acbe6a6e355c95d0842d7454b4c81c8ef934976644bc3dfd2909e22fba89794b0d8ee840af86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36448c1d90e5f9430112f6d4078c435
SHA1f2a697dcaacaf2941e06c760e53e50fb3fe8f993
SHA256b969db8e045ca5815cc0771c1bb4d89b0f0df0160be34428a16af2598c510035
SHA5126cee74694658dfc63344028d28ea310c582ea910caccba83a2d9721a9470535e7ecee92db19e2a210fc455a7ec3ed353cdd876dda64dabaea7dee43701b17d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775445570e982c431434164552814bd7
SHA17fadde9a2b5b3b49ad95f531c06b06725fd67c21
SHA256dff0cbb3cdae0f27f77f76e749fd388661bc789d970f971a5f59e3cc30ea6364
SHA512f901ec2772578fc895372b658502b5fe879536db6ab898ee15fdad3f6a99c17ca4ebcc4870ebfd01d54b01872b87cec4f7f53aa52ddff244638d1bf4b6103b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714321380661753f38720b0fdab58ee1
SHA181ae7d53a5cd40d757380a5815e8ff2225afc36e
SHA256b03cf56fdd8929b2cb1e2e982b4160fb3c9887e4af222b49e21d6061c6750a01
SHA51275ab00d898b1d1e9586ce783ff50edeeeee78bc4c11d5835c1fc36270ea5f6617e817beea62184ef1a45dfb6f97cfa193c5efdccf2d726d5733aecf74bf37f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf1218ab8721db1a84b32ac5abb5324
SHA18edaeaacf7c08f6ee4df242bb7c88aad0d7910d5
SHA256064a2ac6d6150891714a6930815e258ecad1e62b43cf149cb8659df04dd6a136
SHA51239a798f1bec53ff1a864061bd9cbfe2d4a9d3f35c93180df1870b22cd1a6e40c22d2875b9b4847a0a36ab2decf61b09f4eabb00d174b732534a52ed082908dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551c49af3df6b4c8ffa2408b1e4722eb2
SHA12360559516b30ea14efb79eec8e9692fbe3fdcb1
SHA2561910dec549091430a2303bce62860f58e77d0e3c63604bb8c22e641cd6edd694
SHA512fdf02edc3ab4e327d42854cf3e10d678323e1ffe575959677c59653e9b7e9d3bbc3842caa342de8d974ae7e30354b97b36f455b412bbe2f28b709b3829714da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40aad3440011e1393cc4a0c31d55e56
SHA1b975c0762824233ed76256d533923845852e484e
SHA256538ddc585a9b75756d85e1a64b0b06db5ef390b1e7983bb8df9688daf4725406
SHA51259c694485917fab00cfbcf3f44ac6143933008d18ce04d90a4ae9f1efdfc4c616f5975002a49f28fb92c2b3bb0d7aeef169cd549cd8989b9b9671375bb1b930c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57daeacf905d6f15a98e25b11e2cf1662
SHA1eb6e39f5ad4b3f4c32f3a73348467fe320ce3f4c
SHA2569163092fa58c04c11a882ecbac1a25e60c2f3b78d90c3b93ec27b36dbf234e6a
SHA512b784acb4d04b65ba7ed1bcd13cf4689669d375cc3dbeae9e270ffa53a43f0a6c31187e5105697b5a621d3452ecfacd95db47891f5d1d7a2dba1ce9b45fd6dcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf68bae533f25a7971243632284f7b01
SHA1a22ddecef769ec97e90c6b726bd680d09e7283b9
SHA2560d14c74cea14fcae13e8cf84d5f18ce2ed473e777b4c2f2b1d9d43f4560fccdb
SHA5121056edeb5ecb93d1934b98a043f6835e4b9d186a48733223608548c9a12a89fc59e914c13b12f85cdda430b785f61414e8fb8426de2d28beb0c37a864a0a109f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c939f2ea9e6994b4861982fccbcbb77d
SHA16860761c1517cff89602a18052e68c6a6a3c9be6
SHA25673937257898ecb7bd496e5bb2944ab6e92bf92e8dda90c4c02b9eb3d2839180f
SHA512c8d9d063107d8b893b3380e01758890314bd88e854d48dd6e88753a404a8da8da4a1e670bbaf1ed4d7495bee7e0d7ea414809a032298663ecbf850dac66f3c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e928cddf926adcfac6c67aa3b438910
SHA1f280d1b841dcda4c92f2f5e779f37f42442f8c9c
SHA256e04deafb6eec96b9b9a204e0eedc76e2e3eaa315a4609c0694213743f825a8fb
SHA5125718c4e1ce35829d022604a223b9dc2933b358fbd102fbd035b43331d288c2575c733bf3b23d9fd31b89d3d38db5a4a3539d8151dc8c407545687693766d1660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fcc799f945ba2481069cf91cbb303ff
SHA1fa46830673601ca45dd31e34b8af8321db1e156e
SHA2564046eb6fc38282cbbecb924f04fd78890670708538eee437004e9048fb788a84
SHA512663004b801431858553546f0b55eba74cefe014d41a8339aa02e7b49dbabbb87182c462700adfec063fa4e61cf0c09704918e62ad67e52aba115bb011272c4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c46a68adcca6a7a8a1e059f83399bf
SHA1d359e8c7bff944530816ed8dbde67d3aca2ed5aa
SHA2562313b088a0975dd938fc6c9593ccf360f3a13e69893d4023160f9666560bcff7
SHA512a37f046666d4b721dce4868a363ac4c9140ce9566bec94ba473baa7efea6df964ffc1d08f7a92ebc9be231c3161635dfdd01faa3745ee88722721285777deb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ae71c2d2eeb1d371d1cc5bb14d9e96
SHA18579852f2dd6f093354c728bdc60fee4a15bd741
SHA2569d079865064461b583d2c4510a39cfb8c9f8582605071aab805ea18c8410566d
SHA5121888dc14de2379621824d381b511b1e48f0b8bb07223e44763aa54c0b9ad0d6992edaca302a54de79785ec5f6ad202ae64d58f152c4dd88fca899f971770498e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a1e37f1e4d7dc58cf53d60e835409a
SHA10471ade4027ea30e9ea7ae53eff151c575ae29d2
SHA256a3cb4f0b0902e063f2c5e540dc4648075c2756f4d6788c71c67fea4fab0149c8
SHA512378b25de820d11f201af387e3b131dd54c06e7c5dbc54d87016357f3c4d18d4ac1db0298c260b1721e910d0a991a5db6b74788746adcad2f11caefcf20675d27
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a