Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
68ea1d238e101558d7606a65cd9be148_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68ea1d238e101558d7606a65cd9be148_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68ea1d238e101558d7606a65cd9be148_JaffaCakes118.html
-
Size
23KB
-
MD5
68ea1d238e101558d7606a65cd9be148
-
SHA1
1f77057bf838cc10f2145122ae26547f80a23613
-
SHA256
93b368b4fba1305354fe6856c0cf90f0e1d9f7b356fdd37c81bf1fbf5ed3aa82
-
SHA512
6c33da5de8188a2ac29f2024e35a522ab9a80bc0dc24e5ab2dfcd53bb34bcc01fd4887346ce341d816724a2deddd21912cc08512804a13f4f5eeccb008af6e54
-
SSDEEP
192:N2qoi1Db5nwnQjLntQ/NjBnQieHnHnQOkrntT1qnQTbnWnQEanQtQMxnFnQ7XnEW:sqoQhQ/nd
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d924ec9aacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eb3e9adbfe5ee44a7c086f44fa833e90000000002000000000010660000000100002000000036823ccbb245e7838409eac1df54be31b431f216b4d18a8e86a7989e82bd1b3e000000000e8000000002000020000000c43fbeac6e9f48330599107c93d379782c731d3c90ffd8c9f9e547f6460a6a36200000006b972d637f176c09ed5c76c1a745b4679ecb25ae8bb0b8c180cbc43ed4bcdee64000000004eb1f7f64a005b04e6696ceb66a81466a5feaad4d4620875dcecaaeb04d7b0880301080e5feabe482488999864959e5b44bf2f3b498ad792df06d571eee5adf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{156E3F01-188E-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2292 iexplore.exe 2292 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2292 wrote to memory of 2296 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 2296 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 2296 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 2296 2292 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68ea1d238e101558d7606a65cd9be148_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155c7733908e13e396929fa26f4f393e
SHA134136c5ed033c6d66718ceb3d49564c702d6b48a
SHA2561291961e6d97c37651c5bf897cdf5aafa85e6eaed5098c02aa0fee238e18aa38
SHA5122c31a7a5c317ab8ac662a407d02779b57987897bd4c5d4cade6f84de86981e70f4129c4313121be58dd8f67deaf3814b37e9aec75cbfc9057fce6303a9c7b628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519902eb8568610a60bdf99488711c73
SHA1698716b13ed3b5905407a082ab1a90c17bb2aa40
SHA256604d160943d277c8d1ef504d7ec19c321adf91e2b76d2a75714bd28dc664f8c1
SHA5123229e9f0712785b2cb5d9ef76cfd3cba6866f4c912d5848de54d8e18796f7fea6fe6cffbed28563a14099f3cc1fa49fda298b0e436930455b9741dfb80176af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af10a08ec351d58dc60c95c843d15e71
SHA1932412d83885ec4806acacf755fa0ac49df8676e
SHA2563c58e783cb8b3f28537315dd493c307519b1e6cb77a433b3e9bf46c18c11ab5f
SHA512891e62188f6f258f750a2bc7298c1fa6f549d47ec28887b668da9922b0d6afd2a6d213a6a4c989af563cffeebba7477ddee8de0a1430946821916021c9c7490d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51562a2413da53b2c564ee8b4d80c89f1
SHA16ceac92b9b4f39fbd558fd8eb9d28f6c35f816db
SHA25679b9f3480de94da9d5d8fc1e5c0d22aa302a3a24ef922879c969aadf01f36d97
SHA5126b6b17dd7aa6bc509a162fd28fe98715c85a6d5aa21e42744bb4aae06dd138bfebf7bd0019c92f4b801ae6688d84754ece7c4eed023dde72ac92578658043048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9ee34d13c0a383108042d2148ccde0
SHA1601b3ac282356b9c5fd015f90ab99417cce017f6
SHA2565198084498f651b148409fc36ebe2662f126f4d58ad12563aaa095a4929fab6a
SHA512fc44fdce215f6748b4337581565939a46519168d5b5e7b6f25c64140e868780e552ef5fef5098208184c4d05a665e90ba7e3add10dbbf8326a201d6714a36e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f9a8d5b4eaad0de926c5cd83809d53
SHA18d470ef8168fea8871ac5787993aa8a7cfb42cbc
SHA25675034df1af95c972aedb719a52400d3364544a497a9cbb7fede1af56c4652fe7
SHA51263ca7ea46836f075ca300119a9e4a8c5736ba40b22186d8af71e142d039f0b920e3f0f183a85466dd3b5928696efa8f5446bced9a872e3d0c2b723e39c439088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490bae82a38c4de9ed131d11d8f7b4f7
SHA1a914027382f6d918350565a2d32d7113e4005f8b
SHA2569fb85866ae892e5e709ba9a169ca5772b5a140b07f4dc70a4bfcea5ca1969327
SHA5121d84a5c624464bbbe2353e89165b6c826fac32072078c992ff42a9fa3570275c80da46c152cac21e8e29fc051f77778507a5a0afde9717c078d702a61ae3565d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559df14d0c03fc62aa59ec28b15748317
SHA1c55f388256b643bc3f72508ff3ae66b22b7593cb
SHA2565fc5e959567b9555260f75629ba7f4eebb3189e14efbc2ec61382d815c93999d
SHA512c413fc0403275414101ebfa57bea1404c9ac424ef68bc87c27b45ed3616dd80b64faedf35de4aaa0b3d5439f76717556ada5506fc1895da3187b4f441349e3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52095d1d5e70d0a2f70360f93ea013ff2
SHA1f3d621f4f70b23b393555a52a0db62f35bec9875
SHA256c16de2b68cd9bd4d1ee36424b20e65512a6ba9c5e10d8ac72120f2dbc21bf4da
SHA512bae839c377de2c796c3de0c7c82b87d68812a1d0c6c13616c3d5b30a448d8c4c739ae3fc3c9416cba791ee9e495f3bba055fb6c0bddc11661abbc4fdb1339be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5794fc26c931431f36badfd5f909fbbce
SHA1fbac4c43e6c984fa3af96cf818a4e3159ade219a
SHA2566064f12676e3103f3e20be4806c4dd7a02e82f7807259ca8ae718a8ac0a26e6b
SHA5121c5caa80700fa914f3c3a129b885108574558cee9d051c0738b9055dc9dcecb95431186711c3ac918079760f92d0d73af99901794285f824b5f1c8b482f1cc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575b096108013a19a3dc3b391699976f1
SHA11fe615f25f2a73c129f9c8cad8baffbc1c809a5a
SHA256e54c86332b789672e200be88fdf74186646156f2bb4441c9e9a016053a3fdbaa
SHA512cd710fca16f734d23b26ddfc87aff66c4b28166d78ea01d04c877c506f96a5d507684827a99dee4f6787599fa2c9a5fab7f4c11282fb2b4fa9b44cde55aa362f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015047d552d8ec9606a46b20f6545a78
SHA1a1a3c8bbcb638470ecdd8ef261fe8e3683ebba86
SHA256cfab9d727097379890e5a9eaf8ef91d27fd7bef1df015cb7aa579fc3082a0705
SHA5124d7c77931ac343e22295cd38ca856954d43ca3206c7634b3905672dc505bd04c6840db597f8cbc1c99c5651b28b3850775af16f779ba9013410ffd255bf3ebd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40e572275b3909f48a08857fdae760e
SHA1e1a57e4dcb77d36b91fb1bc6ac51835cb9e015ec
SHA25607a1eb7fa7d8f607a99c48bd4e544e0d5c3274b3b81e85aee0ecadc1415e1655
SHA512307031db8d60341c9b87a20db20af9d06c20c75bc78603c2d7658fb020f740a451442f424e11f5cd9d9b2f2a5fe13e4c38cc9f33a372a030cd6ab3bdb3326bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d86843f5cb5f2cf56ccc9a5fb2014159
SHA132981d8bbbf145148d63a7946df4aea9eb7e7625
SHA256bb3aa225608c5db502043808eebc9e951a1ebb94ae7f1d52baaf039b95e2c852
SHA5126192dfaaa80f9f0c1444edc3efc4bb03b4e4694770d1b38d2340c1157e34615495b92e6a573c7d00bb24fab8ec85861b7f32575b6af53d373303bf1b8ddaf140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5708685cb149775b022d498bae84baa28
SHA189bd9e18dffc8cf123b327d6233d31a300ea8e7c
SHA2569df7785622335947162b5bcfea8b5679232ad379dbcb277797f9766a2a0980ae
SHA5129adf6af1be4ff5c5363fee7400190a07c88b876a8601cc3a60caaa61d5119af4cb59279870f34cf54e10e5730a6761c8125a75bc6f5d61cab3e6501f266c0215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454243c9bf0eda05dec93386233c4729
SHA11f3d8e423b6504033fd72f63620459925b1a8060
SHA256cf1aca242f76bc846eec3e6cf9d7351ce24a0618f4cc2fc6e09f1cd80a840d8a
SHA5126e4b6b2da36544d0149fce66e7bcf35224b03c71972a686d6e6919419a37283b80343fb62e44d7014b317d67de0d3d5cf6ac442a5f101e1151015a82c5745f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6b82cc42d08a15d5e4ef829bd19375
SHA1e47b6798e0d7dbdaa83005894ade9dfb391ec839
SHA2569adb26f48d6e5a857dde7feea1ab5565db93490e7c418f3608718104e8656621
SHA5124a57c959eb4e4002f28f319e08bc8b50d6b627851f7ea4d07046d009396633e205af0f42348844f14b6463240261e32ae9f75826884e7212ff9098d50813fe51
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a