Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:52
Static task
static1
Behavioral task
behavioral1
Sample
68e90b9ae1b98982fb01a7b3661a84e8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68e90b9ae1b98982fb01a7b3661a84e8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68e90b9ae1b98982fb01a7b3661a84e8_JaffaCakes118.html
-
Size
55KB
-
MD5
68e90b9ae1b98982fb01a7b3661a84e8
-
SHA1
f35c4b2ef30caa4b3b16abc1a452a3584faa24d1
-
SHA256
da219eeb3773fa333a4fc902459a775d73111672730d5f72873fe57e1431d2f7
-
SHA512
6dd17947e1ef5d2fd93333009aedab00f473b5f41b33f793353d91c444355ec4a9c55d35925d84976fcfe7417b3385ce18b20defe67a0782b49c742dedeb71b1
-
SSDEEP
1536:nmsIgSAEZd0H7reguFu8Th9EKwFrQ7XgaHNk7RP:nwgSAe6RP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E92E1F01-188D-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000041fca3b48a893b498e8e0ac1dad63ae800000000020000000000106600000001000020000000716f6474ba7289c934b8525732eac7d35421afdcae056a51b1665866dc510c3c000000000e80000000020000200000001b6e7984b0ed9805e50cd04feeecfcea79dcd6ab2fbc29e37e19963c8c9af32a20000000820cd8b4413999e68b29c1e377ca26775a70c5a81f1fb5488a6b36643f9700a540000000d790294b6a8c9c1b43e40e1eda4184faae6a2ea9f869b59da978a619ee42228c91b646d45ae80562f4a6736c78e0824bb31e94fe903219158027ead1fd5dbef8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d4e9bd9aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2460 iexplore.exe 2460 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2460 wrote to memory of 2488 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2488 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2488 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2488 2460 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e90b9ae1b98982fb01a7b3661a84e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eccf61a24e0d7a267a97b1bd32aedf4c
SHA1e2eb23cde3000433f25c78c390da12d7797b5cb2
SHA256b4418f559fc09cf2345e578c7b0b0eef11e7a0eeb816a0b87a63f6f7afda24a3
SHA5125fe1cc022a12c72000a0cd030b10461c6b5647521210eb29b51be43e0e24c27bf0318d8e0ad6c3fcf5a199656a764e982ecdeb31f03f830157f43c5699b6c206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d772f7762853d2412f11c88eb488575
SHA152cd4f8a62de1b4850a417041ddc17ae1e31cc4a
SHA256aba41f771ca792aaafc03b40acfc39b9dc1fe36af40e9c3ffd801567cb59f612
SHA5129681e5ead8e56edb4d97817c8144be4879b696cd12f46dadb5ad9f585d9c64f2d9f33b451eac0f8e88f08ff9244b6802769aa420cab7c5a8d3f23f3abc48f197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6aac8ec242d82df16d3b5428ba1fe09
SHA1017ba7b56418bdd4a2188d41e1b6adc2f1fcbdd9
SHA256f6b7f8dbfa0a19add553374b099eb54b315e5671cb0c26384cf69ae038958b11
SHA5127502f10667bdfc1ae2a16d985f23b9e65e12f823f5f4a6253278abe23fbb85616a0d10be009232243a7c477b693e288435f1ce17002274eb9ab597d125d6f692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92e1f5ef3095de7dd6aedf0adf3d47d
SHA105417d8882dd609009778d88bdd7436f7291fd91
SHA256c2e5586495f7cc76840e307e444e02693bc8508e4c03eb6e10f1b3dcbb15e504
SHA51213d90cade443f5be6ed2c02ac7ac4473cddf359654b4690376ee3c5c1868a56ce25898286b4a56cff0c3d5dd92e0d165f73cdae55a061fc27abe350bd6bfcc09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f723898278736147d695119b2d19ba1a
SHA138129934337a9673b81ee97a61f3137917c291a4
SHA2562f36173161582c427cbe9e7a31946b423869d80012b77329221db75ad23684cd
SHA512d20f88133a39fa4c1f8bfa0c8d96ed058885f25614f3df178a1a3441b80ffbffc0f5fb5353c01692890257a46d8d0c8af316680c2eb69f5dd355f4803413ae22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d853ff63f0792689f7281036612ee4e4
SHA1aa21464b39a93285fd2031e55e8bd151504bfd70
SHA256a229f1ef41262e0819bd5d107547240a111b63777e93b8733f70362940c0c198
SHA5123cc32814b14221205c313d4d2da0d493cfcd8aa5655f42f036bec9f1576ee3cbe007295da5d15fdfa9acf085e2924a4089a7279be6b9cb31349547db545d4d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fce7a7fa0921046d8ab9ad29e3f1985d
SHA1f6e0bbc8aeeb518ccb93f41731a197d52638204f
SHA2561820890d6bc7ea3785121c6feed30d31250b37dc00694ee3d9cab25d560f7f12
SHA512d48fb7e07c6d3d233d5415c44cd2cc351b599d07c754d2f51a11d603bba27d692c6a431ef8bfc09cff77c89774702170e86352a8dadbac9e66919b9f64bdcacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad559052f784f45d7e8c423c00cd5e3d
SHA1cfaa336d147fec4532b36e5316835036958b8ff1
SHA256d90454265a3449f6e42bd65a0f6e7c64f0894b91c7b94669179ca8ba06a810ba
SHA512e6fbd0307c7685297a23cc93674ebf2aa77c62c39b839da47d54721225066bbe7b39e5c6e08c2a82527a99327b7d1eee83f286af1c5ee14ed077179c4bfd6fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3a9212082cdfb58e981cb410b15889
SHA1b32ea741e79de195f573125b96564e5fa085482b
SHA2568a85773d684cb0fd5da44d652040b14197a062e0fade9754a34e5136e4708c2c
SHA512178b9a1d244e93132e7fe8deae5d4d341d3e4589d848bb553691e318b20c0cda9ab7fa83001a1c0c0e766f8879912fc439e892f8f2ca27479efe1e9594856ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534adbc5404300974378a95c49321dc48
SHA18abeddb36cb3a52617c1ca6b0f33162224ee3f32
SHA2560cdbb4315851aff55323b8aad2daada09355b87aaddea161d62f72b52d5f3d99
SHA512c435424342368837a6cfb93fbc91c3fb0d45752b0e33b9d019459a83793ffdee93fb7e1c119c6e583ca233aece9bd7b9c608e380cf74f46e28ae06328d68948b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fc1340d5ef20206124ea1484b6c72f
SHA166495a323cf4fcaf41595c194aee519318905e56
SHA25674b13755a57677ae7e314a6c93e2427172e4fd43806e3057a4fdc61b815c6aff
SHA512d7da8b5898ffae83085a86d5ab2206c7f796525124362d8a1dd5bb0096fc486381e4e3f05d74a11178a0bdb69d145a0993e39f2d0f69f265640a33de727306c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5479c12f277acf468b5b7363b696f3dfc
SHA11345bc3f8c069bed2904f1d4cc9748f3c844edf6
SHA2568e62b37a106fa7e698a0e01810e5c33f8d576a00b127b715283015dfdfbdf627
SHA51268743948c0fd30624071dfe81289c9bb6e43d87c1cccea9505c9d9a552ffc88ce7f8bec8f8396834d5f24ce956c9bb83b60c257632248ec321e0930db9de922b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081047d14995c49cf67872602775ea30
SHA19b838b4d13e3b31737983d1003f7b94444778e98
SHA256c350668bd062be3defce4885597ca17d3153810c1f69b1bcec8154654c5d4a78
SHA5124e660ee13086b323f5d4212f37abc569eee3c5356edf85d400115357f7230cfdfda5e7accf28f6b1828df3adcab2dd7f3b948952cc3b6089c34332b45bf6166c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d954642609727960bc929a0a65968a92
SHA1051490c284f3de6b3969c4bc4e244b34bdea7729
SHA2569904ab9c05af423e7b33aba90c613fcf29ac3b1ccffb6088bffceefed6ea52fc
SHA512600151555b7865733c33a1aeb6aa2b425955035b47d45ce50a821648ba59db7e6ac46e74aaba4fcc4437dfe703bb84a94028762d82d5d3be9963a58bbe20ee1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2288c866f3aaffa1d268e6ca140f5d1
SHA1e15c0306231ba275e9851b752db03bf6abe78532
SHA256c6278f741e15b16000e3848461c903c69724f4c43a3099abc02b1b9ba164ed7f
SHA5129f5efb57d5c2e3ebafd0c6dc4cab82aa999aa7c622c676b55812d8f207d77188f77f2d012ebd374378dba8ac46f16f2638fc54b0fe0904d0c89b27a5c9ba391e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d38806a95b0c67c9bf65859020798d43
SHA15a279750d5e5f8cbeb741d59dd0f52e9d041444c
SHA25668d32fd969d20da0a875b9aeaf347443a65ebfa01c0aa1c19a3032534ba02ed6
SHA51226cc65be5d114d47b16bc14bca4666668677957e4e4e7ab0aa8d28fe72db3ba055220abb34b849c5e26c54bfa7838baf24fe10b3e81cc87959132a32461932a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50430144d107410b5cece669bb895a7c3
SHA17ed128f256f18d1aa5d22175a1e246c77468d113
SHA2562ae5d95783ec3296bcc3092d5430783205f8466a01ab73514128b9d43642085b
SHA5122b16620784b33f70a5bb3bce6ea72fafa9fb04249dfef2f01f8d8ed1738a5405695eb413f28d9b7e5dfca191e5a26023a0988b88632c4d4090e25aa119866e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5996c6a538bc5edbf419c90e539d527a2
SHA1a382c92d0b991a8baef4ec9e259995a2ef735771
SHA256bee25d42321da8f1605e2be38c85db173ab4a4b72656f661520f12d60ef17137
SHA5126e5f6b50f2e2f831eba580f716b9556e24d041e30ba1db0f846e7cc79579d5f093b4ad2433cd8029ccb4c7b372e5616c470312ec2a9ee4665d9a16d69d9fd8ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a