Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
68e810adfe465e297b4509f4ef90a1dc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68e810adfe465e297b4509f4ef90a1dc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68e810adfe465e297b4509f4ef90a1dc_JaffaCakes118.html
-
Size
4KB
-
MD5
68e810adfe465e297b4509f4ef90a1dc
-
SHA1
bb0e0417de08eacc05d37d51184c430930fddd4b
-
SHA256
c7152955406e29bb641769060d8a17b7fc50cfcf99b9b0fc84c4fc9ed5fa1e4a
-
SHA512
0f8ef85b5d7fa5b813d34483a2b213a356d06b26bdbf3e1b8967ad1f8d756c0a744c76550983ddbe5734f4ac5576d58e5ed8da5c2605fde8f5b2075ca53cca75
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o1d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDq
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003b4dc662ddecdf58b2ec41136f6e469a14c660e57f3cfd80bc86541d21ec147e000000000e80000000020000200000004b8e9bba7d9deae4d504b3962ec0369cf19270e17b507cb5a558324273f089c72000000025019efbe722b159af4ff5e99037d9559382328abcde88bf881e2aaa0a7d51ee40000000a83eb45e3908d433ce686dba609872de71e583a16bcd0b6b1477d8c42cfefb5b4a7f14c7e081d1492d01cc294a2a9b38d5448a8e0670edeafffded77e87bd088 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105956909aacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580116" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBDBCBB1-188D-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1904 iexplore.exe 1904 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1904 wrote to memory of 2564 1904 iexplore.exe IEXPLORE.EXE PID 1904 wrote to memory of 2564 1904 iexplore.exe IEXPLORE.EXE PID 1904 wrote to memory of 2564 1904 iexplore.exe IEXPLORE.EXE PID 1904 wrote to memory of 2564 1904 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e810adfe465e297b4509f4ef90a1dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e082b65f04f89841cb1a4127b53c05f8
SHA11f0e05341730eeceaa8c701055d31861ff5d7715
SHA2567b0b4159e54fd95ddd5e3b47bcc0023e43ae73a9caaac40417fa2affc311c01f
SHA512ebb1538aab6190a239e5e434be2c4a6e256ae1676273e4844b0b8fa9e90e9caa7aff9b707ed6bd69eb338ec27922889cbae9d3cf7a2bfa2fbfc1eef6d918aa9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def8e03bd79161940edd878f9811ffd9
SHA1e7e987286baa5ee54df6de7457992422d7f70c48
SHA25640e1e0718cc4f54a2f88f04efb05c08cf7d1d15d7bb31a6192cd3fda882de866
SHA512b7e086a913c98561254b8cfc39436135fdc3d6667d407bde86f3a24d084cf206df50c8d08027d883413d9d0e28f4fa098751bacf8a8c297b402d0d6da1bb9a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf8fb679c21c30bdcd29e51b918460d3
SHA1de90a47cee97641f98b50d6760254844af77c727
SHA256723e4a37c82824ece17c7780c80a1b151df56408804f181d750d34c9b3871c2f
SHA512473709a8781474db3ae1bbed0ca68fd367278a54fe8255b34d26521102ed4cd11e0e2a504986020954bf373a91a4e98a18ba351f763dfb40019b7767a7b19885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b55c61b799a1022460db8ef9e20ef29
SHA169ac5b0fd8df814c684305f136e460eef48021ab
SHA2568213859542f8b69d3c78ad1e3e80c73f47a54c3090c55556f477a19d19070bbc
SHA512254517c7fc31a1ecc74f846dc39418a37d23c8b8a4e2e251fc0c810d9b7775b342e8538ee29c257e20ca5ea885707430b6a9f0a7adf3b5cd3fda2d2d0359f0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e15536d2fe2fd06059827f739ef1c56
SHA1ac3e839dd749f90f5cbb7031a838a35af71c9dee
SHA2562c32e18bc7a3ad03b25fed268dee7eb193f096ed58241cb38c30a4d314f0088f
SHA512bd4d302690efea62f8b18674432d0142f306c692dca3a8b16d72e4ed75e996302bc6c25d22f95e7198e0a06789d25e608c64c3cb36d648455f309d5755e8f98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5cf79feac4839a8fbb701e47bc46597
SHA18b4d9393d54de9e7b97f901b40007affddad263c
SHA25642e594f3fd137c2bcc639866835b1f186f44f292163b1ec17932a90c151eace2
SHA512840bb6eb012ad7211e8724cf26fac639a199716f2059893b7b1c38af5cb70b73d8f962a6d79731c98616de5a1babce95b7f2e8c773a65663ced48a4b85b625bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516fe998a333a1d87c01e57d8fb602a8e
SHA1c146b94692b6bd690dd7d88eb0fb3fe10f93bfb4
SHA2563b9e032c746c17f5241e800c98007a2a7815a123d4dd3f9cf136dae37650bb7a
SHA5120d1c754bef9a31bac03cab121a81e90028ffa15a782377d8bb60474ae4eb0646cfb8221b068f20aba564b07e14a238bda88ac102edda855bb67c503482f38b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57597ef06487f4e7b026f2d19c8130163
SHA1f345c01e6de0ecb9257f9c0fc02a4f8d848a33b8
SHA25616a41f1f0ad62bff828645a9d2e9d11dc0803b8b2416c19993e7e6adbbba3307
SHA5123688a0a91d1bbe6d1f92e2b4c9eb90977da045afec4153e07302baf61992140da173f3cfbbdfb7324909e72c7f88e9da7978866bbd3d6491611be990533b0466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d6bff5ebf41b56ac0a6c65bcd3935f
SHA1916450f11e4410d715f0a57dac32db726eafb42b
SHA2564a3e10522788e56c38e5c8967525c022d68c447448341fb535965bfbfc32b108
SHA5122825851f94f6dc8e58e83a7df5441ae80d2938241bb23815c68cf3d0d43e96d5ba46d3e02191770b9c5c226926c6589569eede44b39f7c2adaf2bdffdb54f300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e12c6e42bbce6e38d7c5cf7f1f6e9af
SHA14e903e2b77d10ec162c752ccc5ccf68ee3e0df7b
SHA256c238f500d3d698ccd35203e8d3507530619654405153dd76cdb9f6fc9bb34fb8
SHA51235e5bdf080c32854e3aa68a814dd69a3fd02179db90db73997517a1f12d7ec13ce6f88eb586f9421a102c077055dbbaf9a67c34f0d5da06c7b582ddda5c593de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e04e4ec7cad67223922d20b55a6b3c08
SHA148797fb4f38b9c6aa116456cb890b5be8b78785a
SHA256864c004a4708b2c73021eb7f12623629d2ed0bc254b29dd199ee3651436c49ba
SHA5126793222b8f3c86f6faa259ef2a74b26a44ede0099a3d9870e8a9c4a32f79f298537f6be2b4730ddb8c89b746a9e7c7e382e99ee0c15e8161f194edfb1c449708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2966a153d9e86e9058a3b8cb687a34d
SHA1e292598938dc9475e54c639c086dbc94c80f09bf
SHA256d4886db50af4a347151178e58b1f9546dfacf11c0c2fb462a2e85a8b4b2e5f93
SHA5121be242712fc459a148883fafaa7a1bc1d4ba0cd1794d06f6f8339919991775281b3c0076bfdaf23ba071aeb1876c33a6117a5fd0c833bc0bc4fe99de95ec3cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592aa6c4cd784242d289dd642bbc6a2ab
SHA10f47df030d2c4249d65b1065ccd3776dbeebf19d
SHA256999e05d3f2d67fac5622387a67138d2ddabaf0678a67559683055783ae98b823
SHA512a0833f276753aea50c96b6f87c93d40c145492972c848a54af6e0b021a16d75a73e8dfe5870c8853fa7c9988658e517578a9dd7790fe7f42cd5f8d04805d22a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0eaa373b4239aa0efa51d7a5087922
SHA11b6f24b26db7494a7eef62f75877ad29a822e009
SHA2568d9573bebb643b3dcf069762b98a70f113fcecfb4afb32edacdad3841467f35a
SHA512c459c1732809b84c4c1de0cecace6410a78ce4d176b84b960f8bb36534fb6f56fab83d3f138a998da38bc873a9b763de69b0931e35d8a43dc8c449ad918f2eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a87fae36d31e8dcde81abcf0ad334ac
SHA10c282cf94ba9e9a72ac3f277c4ab763b29bb0dba
SHA256d4cc6bb78cb22b4679c303b3d055946ffe4f3f5464bbca3e3c210e980ed7695d
SHA5126c528e4c88a82771098d6d97c16ad18e2f91c4f88332bc66f442eaeed4d5bfeaa8156b0b46ec79e28b3efce6b51ee575998aa96d7036f380430e0d88d645e81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa81ae0f53a4c0f5e876d0b081a950ac
SHA172ab32a326276860cd2b6af908394319c36c3fc7
SHA256d64daed13fcbaa4221ebd07a20c76db8c3df5905b68b1337289e4561dcc2d1b4
SHA5129bf545b5581d3acb03cf53543aee89c6dc7302cc0c2382874b43f8498c3195be86062acaf5e89e11957f590eb08777f5a085fe9fd50a665ffd619c4b08634e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b7f9b465c43a3695415f3ea4c399a3f
SHA19c0abde63c784ce2790e22b51c03220988764a8d
SHA256f0294f17cece422bf4983b314be01be3f1920a02ccbfe27fbcfb5e5630f9a1be
SHA51225e4aed13733c1c96b3c1f5565e901a2afdd2a12c0c3533354262fd6410c878cbe81786c6767f48e8e7484b8327615ab3dbb9914aaa2a9080e24efd7a3c6c4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5492990a83ade2b7e730e28c4f31b2e51
SHA1563079d9b638e236c8c81bd4fffadcba3afb0b6c
SHA25678ac3d57ab652a7230fef02b232a81dc88ea4b00741b09e1370572bef69619c2
SHA5125260826508b47a7a23ab8bd069eaedb2c0e86e467a0918b6c18eb4f714c4abd45a36003be4ac505e0abc2b93234b92611269072a97e21d1d69a4d8a4ff2b873c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1aa11ac932d45d9387ca2738437b05
SHA142dd8c8090262b0cacc93a6fcb104e69f80c1cb6
SHA256ae552b7e46dabe91d977706171a4995b4235605aeb703f99c0d484a79ab250e6
SHA512e22b119f9135eeac19dba10727c61e460e8549adb2613498f50ba0b28d5184e4791ea6b25fb5bffcfa8a8286757a68b0805c35af066a5daa102c721f740ddca6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a