Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
68eaa607d11bec89c363be7002ad665e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68eaa607d11bec89c363be7002ad665e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68eaa607d11bec89c363be7002ad665e_JaffaCakes118.html
-
Size
196KB
-
MD5
68eaa607d11bec89c363be7002ad665e
-
SHA1
c42eded6958c5666f701abcc25ab88b4e137fc98
-
SHA256
7a4d9cd9ed36befe1c104cbf01f3b2d53bceb889f3e984f353b6c43cbe379dea
-
SHA512
3f8d7b645b9f02d6792b33b4d2bf58bc29b0f1fe840ce1eb40a252587405f6dfcd5368357d8ee11d7d813ba72cc125908c4f53210d157265456eb1f3208c94ab
-
SSDEEP
3072:SrsyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:SrRsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300702579bacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000522c6f42c4d689c70b4b8432db64f702cdce7a8ec451efbe9b42e5562cb6d01f000000000e80000000020000200000006acfceacf1bcfca30761e2d541d651b662e9d177a30b60702b1c137c4dbcb6f6200000001c9ae7f98039f647a5a0b39e6cf360daec2fd0fabcf5ca92a5ff3af41f1dd3f740000000188c9fb8bbf495acfda08ab475ea0d564dbea4a5341408c8b91f9df675eaa1334f52f31ed8e7760e426b3c772ded3da847eaee21bbfbcf60dfdc2cd36f4c3c22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43CE2221-188E-11EF-8962-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2756 iexplore.exe 2756 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2756 wrote to memory of 2672 2756 iexplore.exe IEXPLORE.EXE PID 2756 wrote to memory of 2672 2756 iexplore.exe IEXPLORE.EXE PID 2756 wrote to memory of 2672 2756 iexplore.exe IEXPLORE.EXE PID 2756 wrote to memory of 2672 2756 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68eaa607d11bec89c363be7002ad665e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550015fb07e837303bfca3f24755ba410
SHA1e49fe92ced915c76cd5aa7a9b02f51744ba20a2d
SHA256cf57aa0d6544eb7c75d65e93caf4e9f15d1d05bb67ffc21628405b48ec1b570b
SHA5123000ff2155c02203e73434494e515020741edece378a210185de5bb9bf1ce85d0bad520c2c29c81831c792f4866e4b7e65088ed944371569894d8aa70d156d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5711fd65bd803f3be3dd7d95716dc931f
SHA1d49fc97dbf2b9d369108437da87fc0b91dd7c193
SHA256e8c0c610f10b9c7cc1142d7c107e6895cd301ea10db1cb86922084e636fe776d
SHA51298a24623cc2c285c75048dc5862ca406ac83cacdfc03ee6671a3c9289e3bd2c42bb2705e5827e9befefb34f4d51c26932d892f2e0ae98a5110e3dd7bf78d3113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836e2b50929e92b5355ed0a65f37d81d
SHA15edea01fc4e7515e043abcef75490faae37e80a2
SHA25683c2a1ae5f6fadaf3ca3f4a3e478da6121f18bbba67a943ed43189fdcf34ac7f
SHA51256fb24f764969c3e939adf2ea3821c21b1faba3da27982b4f0d2fb7007cabf3549cfeac25145a40d677f0a510c361675e011697356fa531292ac60488b1a5701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595690eb3271e195d3dc05ba5a5542348
SHA1341a49d66687db41470a0da228e078c6fcb54c59
SHA256a3bbd47fa537609fb4c16207e7494e714bf0438fe02e909fa585709726e2c83a
SHA5126ff16e01170fc2d19c61bad9b369828786641b2835e8ca67dfce5064ab435eba8e82c1779b30d59d0cc7c015cf3ae941c64c74f6ba0bd90a79a2b895e6676935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e367287e438e886459232c3e4a8581
SHA101bda3c07d3f9ad7101a6dc621186ef36f7262d7
SHA25637dc9495167e3cbd59d8b3695da0d08612855ab4e69ae82f4c40344e3bbdc66c
SHA512bf3adb208a726c7a2376edc2393ec171e37f7e1cb17adf3ba4f6af555d219eef1c5c83cf6c10fd44330ecbae106004dbb263fd938c680f2a79370ea87328a3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d20018b594472e5466acff2905cf017
SHA147606d41b5ebc26705f6e9850a16137b66bf8619
SHA256f23d34120223d86f2e7237d1abe500f38ad685007089516e08e30dcaaaa12b75
SHA51264160a3b67868b9896191404b1fa5093a80971a5afac73aa5eb7af016bbebfeb459b231119dce4453e5cf17bb7d7883df533a4bb8e5cf76ac28d95a214637c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f817d4d60666c5fc8b5adc651122d5c4
SHA115077fc9acf547ac8a13bcb8617cc902cbab0342
SHA256bb1e8f883eb9a120cc036cf1012f861cb1226d98292ba6965c9775d564827a31
SHA512edbb7ed2420e4c6a75aecaba0f20b03d55a001e7a39c7ca12485093c1c93165113074cbcda900b773c01ee8473d217e8084b5de72697154a260cbac88c43bd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5468f0b41077374df2acc710d9086621c
SHA180e31bcc174335974910d6559a028a01ebd9587c
SHA25632e68aeeec5ffe640d54c79aa2bd0660f617b1fa461af4dfeaa7a9f9558836bc
SHA5128f8e40ad9c40fd1eb07678f56f4d8be60687406bd583661a758bf4a8d4c7cb81f48c3489df15099a20c84516d4c5b0fa53f5211c29b537c8d7a201e7e007aea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b58a8d4f470c2dadcf95dcc0e467239
SHA1dc823f6f4be605aa12db55529d651e4081bd147e
SHA256816c1b855fcf58a6fada5dbb9f536463ebf523ba106047a88ce2e726514f0076
SHA512427673864878a56ab69ebd7f24797f08ba59a1483eb47f75181d436f0ec167aa22e1ac80954bdfd74db13d2ff4f276a56ac23218c897295539fb19e9f00a2bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595d0fd3caa88c900a5d03ec3ccc06d11
SHA1d232f310a242237a323a26ba59625800fcb77e31
SHA2560f052e0d6cc36eefd8b3b79d63127997b0af33317db5d20849af1d86e2b58b04
SHA51257fbee99fe00a565d968df819d9d8cb071c5a9a69541a3fcea497f935c273e09a532b1154bdc8676342a54822f3ae954e12906fd4d286c67a8004ed2b5a5aa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d76ab1a0099c2c8a09eb07f2e74767b1
SHA1e2d77f62c5db4b7fdb66a49ab14c98d21cf8c6fe
SHA256b6d1af71f96e0550286a58770bc0ca02193cc2aae712e4d1c5b56dedbe9b8eea
SHA51287b5ef652444d2750cd63db2b58db45008ee846abbfac0daf9d6e94e27675d3a2df7d421b55779cf1ce60cedcc682a2dc4adc77677ce0c768f7d7dd4ab9161a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0d067e864b6485246d1015ae361e219
SHA1f09e587ae0ac448ceb0900d05c32d9f05641a8b2
SHA256d1a2f108dc2a8ac338f9302cb08af6dd3f02e5010daff2b6c48f1adf0c763d9a
SHA51209ab8799242de278887f438d18f588ca6c85d60e4297ce17e780f779e0b63633ef802d41256198f1c1cc9bdc6e6203226bc33b3c887c4fa25c29f311b8cc34e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d28b87bd369e678437fc8e4c25c68c1
SHA11e08a04aad3690cb7c9669a921d91c8224a0ae25
SHA256f083c3016ff53faf4feb6ee71d2241d946814ca473018c121549e258a6c2898c
SHA5128632a47c750d34de07ffb33088dbfa042d250059ff5bead0086cc01e5675766d59b8cef56bf686a47abeb8440a84c381a23bec4f9c10690198a56ce8d8a0aba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a51124b83c3511bc96a5a88f7d10c44e
SHA132e785361072878cfae8795ee496164578694d27
SHA256f4768044843b27dfc53bd49d2ad2dc31ce4a4675a7673b37a54c6485dfa14d80
SHA5128899561dcfeec16ebed7d8d95ce47ad2d4c85998e5d8c83fd62f5d0bfe6adc77c246c77fb11e63eb024894e19df58c23152a6db7b70d410b6629561182c41350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c63d14323be8fdf3ea4a2e7eedde582
SHA168a7ff9c025368a6ecb4b6757a16f4d97eedeb7e
SHA256102fe0898c8d40984ad683ccaeed98677f9cb69b9adbe225fdc9bf580af9c623
SHA512ddfb8f11545d4f57157cca86471e7d9497481d5e821771a45e78c104e9cfa8cc306038f7b530ea34cb5986c52d847b29a11a7e6f6945e972534d2eed49eb1bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e79b0279ac9da06b959d59473dcd73
SHA1af43bec9c36153f3158979c983f3c236ea985460
SHA256a2923ee0406b97cc1217dd4d84474494f1be88063cbfd72bfc50cd214b3e5c58
SHA51288ef3956e726f1ba1deca46e6341ab0cb82b4740e80c191249f5b018591a2f5eed8195e5415e2abcb8acea6bd49a6a49585763ecfab85b92bab259224d1e469a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58daf541dc421c0eecd8acece2385e270
SHA14317ad6bd5c771038f58d4efcee3c386a92ceee1
SHA256958308db4db97f8cf0facaec3767bfa2a1dd24b39cd5beca6b387d17589c1fc5
SHA51231b9538e0099dd16badf00a3ee50e90d38ccfd11d8b7c327206c215f47571cb386865ee5e4208e2a8cdcb03fbd19c820f6412e337b9dabf10251bcd510a1b67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd3ecf427d125973a0eedbbe2fe74fa
SHA16da6dee49dfc6d752d30168f69617a120845bd5c
SHA256aaf03f210ae36d9c476933a05dd98b7c4bd6d9fb9f938a5d0c5fe1f5d2e21c5f
SHA512e15f747f1ccaa61d3905d3d4a6d63782acf1684e44d9805b6c1dfb4f9ab35e15e488268625a637dae47b59b3ddb2a465144770ba4945f4db2cb7e6b6149867a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52382a66532a2ffaf4f27ccaa0aacd273
SHA12c3f53d010b8926af688c2e18593192a4b5c9a6a
SHA256d7efd27f9a2a0b9a74831e5c86b5a34d87a22f6c2744bf69c6a8cd2c7f18f65c
SHA51297a62cdfaf16cec502c1a12ae7ae8543619c9fdd34c93135e0385a7da82106fad2dc01013011fb3795b50621915e4629d4ce3cfcf71236226e58267766b3fa97
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a