Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
68ed32b2ab9522c0a6feb8c437a3ac94_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68ed32b2ab9522c0a6feb8c437a3ac94_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
68ed32b2ab9522c0a6feb8c437a3ac94_JaffaCakes118.html
-
Size
67KB
-
MD5
68ed32b2ab9522c0a6feb8c437a3ac94
-
SHA1
db9643ba313dc7ee4ad95903141c719fe8bdbf19
-
SHA256
2c9d30f8132d8a9700c20933dfbff733bd3d93dc2da52cd8953ffb690b217fc7
-
SHA512
0424b55a0456a9a0afe2db5b406ddf66fb2a110cafef110233153556b9ceed4aa75d3760914a3ce115e25a32af5708fa8fab70202b0159a9eec27688ce7add56
-
SSDEEP
768:UgOriWNcaSoBgGDCuCHUScovagtk0xF1co8vvyNQTfVY2S4Hx9:ba1CuucovNF8vvGAfVl
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580496" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D2E7181-188E-11EF-AD44-52AF0AAB4D51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008fb325243f6bb3a8f7afbfb117438357c0befd906bb68dbd8106ba3200414b0c000000000e8000000002000020000000770414ddef22b81824ba0538548c2c9ec816b3a0a43c0c7df3aa6bc3242e935f2000000068eb1e8f5d501b5b43d20cb3f39f9cc847c077cf58201320cfd3b26d9493cfd84000000025fbf2310d8707fdc2a757290f745e84073c5fd457a5309a36aeff2b40b3fed8c2a816fa43779af1697922d3187728514147d5d2cd24a1b1e40cec70fac3a8a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b374729bacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2276 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1720 iexplore.exe 1720 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1720 wrote to memory of 2276 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2276 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2276 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2276 1720 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68ed32b2ab9522c0a6feb8c437a3ac94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cb901d6b9e26e6fddb1d88c00a76ab4
SHA12c33d76493c21b0d2fbe19fbcfff8bd1b04343e8
SHA2561bd4e5ec446baaaf5127a1172d5ea4e6dbec3ca5e851faa029babe3ddd927f44
SHA5121123884e417d905ccf514b82824461bc37cda659603bec4c3bf9aefb7df7a1daff1b9906a28cc0d3c5a86c5e19ea88f2dabd2069f429989f9f8efb60ccf1b312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439614da6684a357a6bf85befae9cd6b
SHA1f0b30006ff85d5dedf2c322dc9bfda63b2689a28
SHA256a111d949421677166767e1b19646663bdc97b87e837526eeeb784e4cd51b904b
SHA512b27368ba94e7eea67c28985367c35418c9002012884c933c4dec1ad3f1d13af96c59783dedb1b4876d6449639c47e2f531577716504c8b2cb96d40a89728d535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b27c522f17aa8f0d611254957685a7c
SHA139ad8911a1c02e96f2f18b2219cb23ef059e0c65
SHA256f87136b3539ae92440df7f1b8a810ea6df32d11165a2213a96b26ab633c9510a
SHA5126c7abfeca78e344b6b0ffda6a1df40845fa9d7cfa2b67780c29fab5a72e577466bec0bc6927498f2fcf49b2c02a9bab4cbad23f42b4241815a36586d4c70b1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a04b7ab4779b7d637ee189fa7bea3a7b
SHA15eda36fcc5a5b193aefd8fb816fdba9f8c052344
SHA2561317329b9200d3d2c6b203707c160999ff03f5ad7a1f5fb4c1a4b744974695da
SHA51256add604d0a66d686203f49ab434dea090513c6e7c28514f35ac5cf30efa41fcdb135633f1006eb7a232f466b2ae553bbd5cc170d2b31ba3bcca028a52f7336d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5bbfcb9a1dffcbf567c96c94cfdfc6d
SHA1497ff94254e6791719e14f02b84a19e3dd99aeb9
SHA256cd4437bf9bcdaad12fe6ca3faf9f112b3ceeda33791221bdd7d635104fdcd8ac
SHA51202ce958407afbcf4773fadf38d1db62257a4ab92162b3a4b4892cddf4f22cbee8bcedba599e1c68d515b89e61d6f7de1fc22d895c58f0a1976e175ac5b402de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dd4dc2c0817c8d839d281d07c0db99e
SHA1b5d58e923814990842ccbe65de085f22ce6bfcf5
SHA256eaa4ac73f4fee7461c7788adcb561bd7579f093b0706c63a62de013334f40377
SHA512538aa3457e08b601e6d65e102c8cabe991ffdd79a4e85431771cdb10b9e0848048c8ae84553a385fb98fc038f8146feebe5043a970b656229bc51a82ee30a950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818e65fa2492a24d4ccae602a2d0bf77
SHA19e63a93062e210281286654178e3060b59645ce3
SHA256ec4b132b244b2e16249b46bf4b2d6126568d6e6499265cb8c646ef8aa645d5fb
SHA51250aa6ba8abcd381cdc60afa4b5ab17a3c3ce03f5c717bc000ef8b659f27841cd23a6afc4ca6a3ea19c8334c9cc2642378014ac3affc0bb01599002e033e85102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d11b70bff05dc0ea123729e40e18a5
SHA14c936f7b4ce91b6fa02f41a1c42c505d7f9bf062
SHA256a451167616c6af0ac4bcf97cd2c1dd4dfa5c648a80e8a2012e8cd64130643faf
SHA512e8bd1fba8ac37ff97d75a32483994cef6357350c20248f9351a84b6d00920d201b3972c12019832f56f5c53feb24cc2952ba00a4098352834b66cb7eecb794dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503812e05a358fd8fe8c763ae7ce42779
SHA12f43802258a04399329b1f0203609347f8ad805f
SHA256413d4b6ae39032332f35c2136ff2deb7bc4203e70d906b5aaa6275557bdd5184
SHA512f28a9b1fa90c2b828dd286884611fae7c19c04811f3a802a3c06c181111aaecf56851353bdcc329a863fc88083e6280e049d39c8a0d81ea169f18a052ebda9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ab6bfe456f4b5278614bccedb0ccff
SHA123c7d88e073ac328537fd2e796738542a0bfcd48
SHA256f38631fa21bf42245159188eaf2db0955ef3778853e39edba158933d85fe3784
SHA5121f42f16d10b87c05a496d12bbc314b979bd478c7795c4e9b93fa2f6498f83f03d52368996f23ad883c40efd3e0276d2ad739049ce79a71e8f8d675035ca5801f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc34c771f4749f03534811ca54621673
SHA1d32f67d0ca3f896b4b1f7258b910f0b711e74970
SHA256fbaac70685f0866b88be0b2cf0dfddb39a0acb7b3a7fce69444fbc1b677b6502
SHA512c5ef9748d82c75fc80d2d058d46e3a4eefa05224d8caf7bfada80a8da43bbf5c0cdb4d4c00e5a722fbd7d845fc951570e93bf942663b1703a267901f3abe5b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41b76f4490842a54522727af3ecdf72
SHA1008de5fcab671c4e081bda0d718d6dbe0531db67
SHA256f72591f41395c6715eeb0bb67818b8064808bee9f0369e1f2bb55c9322e1e7b7
SHA512d0ade5f81b70460280dd60f1b699c5335549db6f0499bacd44392b74020eef5272b254ef5c3fbf18022c43e0058fbbbb70fc52ac5672a98d34434c5ebfc6ae46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca9b0182682b2fcb4c263f204e916eb8
SHA11bbbe64fbf212550797d21cd7abc02181a5f311c
SHA256295cdcba2e8865a1e101fd03b12b8b896f1ccdd1d99d44185f68eca48eedeb2b
SHA512081c955dd8350df93c2a5f395f49f2f37c5f1fe2b9405878fdec62f247f5ba554dc57efd265ec52f4558e953abf6febd87cdf0b9ef15da88192895ac5309dcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b377dbcc57a2f77047bd019f94ca2c48
SHA1dfef753faf15c4d73ab4f891eea96dfe0441c211
SHA256c30c8d5ec8ba325093ca279928ae51b78d8c0f22c3059109aa8556b8ece3246e
SHA512b728ebb63d4960da063d6fc8e7acec90896c37ae2adafc659e7f1eaad5f461c86261be9b4d75c64cd01e7077d7bd171f4135e4c5d4f40d7bb9baf525042471e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b43543f118aa2fa4be6f36d30fba755
SHA1135e15f9d799ca1d6776021a9e2d98ceeee3ca35
SHA2561b79228d4e540e347f6847f2fbaa39c1419adbca8ab1e439407abea6400ab882
SHA51291f0694c23b79af5aed99e04a17c89c4a2764288773dc572b4097e6c7e5880a8f47a5d6670292dd0b98ef4c4c174334ab8fc1c660e6329d0e1e96459427b72ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ae88689e773cde7f536d1799cebc33
SHA1cfa36046b76fd99b0a868f33f1592a224a11865e
SHA256bc19c4cd3185038fbeacfe7ef09131aab22c979b9d2eecb447a1f6953ee7accf
SHA512be0dc83eb87c08fd46be07f491ad5b93dfb18cbcc068bf197e74d78dd68247a2fe50c9e8c8c6abc2561d7b61c28e0dd4e32b3bbe25d389b945d157f925d841fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d63bfaf14d8a37a3ec29ea34b607840
SHA1f4adef69807a90898828208dd1e3bb7932d11b24
SHA2562d3ebdc9634494041b5f39d97bb70267d5ef6e07c089151c365987da1ca2cb20
SHA512e60ab061fa5c63d31eabfd7b9561ea818e97603584a334d448e53d7558aff896524dd40398dfc0b01065b3af2b9e9da9455936aea0e9a68f9e4a7f000953d005
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a