Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
68ed5696e9c3ae664cc88410f4385ea1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68ed5696e9c3ae664cc88410f4385ea1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68ed5696e9c3ae664cc88410f4385ea1_JaffaCakes118.html
-
Size
1KB
-
MD5
68ed5696e9c3ae664cc88410f4385ea1
-
SHA1
10b77bf1a386db0794c63f32cadd507e1379b594
-
SHA256
701acb62cba77302b8f8819461fe9b7d0131fe67ac795d52091a06cf917e81b1
-
SHA512
297a3348cec0e6cea9ae23ebf5e5a39b520d93414fa5f631939f4019b33ee61a51e56bc319741726696a388f9082d9d920a74ccd4c8575e932edee1fb6d56015
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1F16061-188E-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007df4cc268c07d816186be9969009875f22f5ce072277a9a0664b5aae0e8d81de000000000e800000000200002000000090f1d9941666d974ad9f3e0f580525945f8e5cbde74787443ee32905d650cf11200000008a4d25c32e849724793904efdc816e0bfbc7d2dc8406c416a93db36484a313ee40000000c8f85f10131f471bf3c0ba8b99b492ef45529c996718923b3afee5de5968336736efa20741287d2ffa5966f3675896827625b0c1115b2622922069c57022d1c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905985769bacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1644 iexplore.exe 1644 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1644 wrote to memory of 2052 1644 iexplore.exe IEXPLORE.EXE PID 1644 wrote to memory of 2052 1644 iexplore.exe IEXPLORE.EXE PID 1644 wrote to memory of 2052 1644 iexplore.exe IEXPLORE.EXE PID 1644 wrote to memory of 2052 1644 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68ed5696e9c3ae664cc88410f4385ea1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb56d0fce7d3351f420e1aee478173f
SHA1ac9371c8de6e8d199de57837dde1a706480c22cc
SHA256cffcd4e58f596e34c0d2f82ea9429210ef374b528c9211acce3cadf1a2eec328
SHA5123dd6473793bb8da8349170007c51711ffa604d71f10d43ba3f39c96b456e98684175e5bcc620e8d24f6c4f3f727d50c3d3c612f292eb44924d9d823998bb9e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5367c742a75d7bd263778a35975b1ae72
SHA1abc3444f7448103fc57b532b62caa7c7f4b4cda7
SHA2569ca3d74db0bf6030b331a5a2b05f9fa9480d8840bb111d02c790c450b52b3590
SHA512d0ab85ff053a53689eaead78454b19b515ff37a4e7e65ce02ad312e46fae7623ccef3fbe7979ae60d6d95477219ffea3c8c6e6db3dc2e382a6970d8f4adb3722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd16455e412e4c129392a0b392af769
SHA12844a2714ca3d7f5535fff2d7946d9f4d47c1858
SHA2562421d7d13470f2334ab414a8dbc3d2846a99f651ed9f4ae4036b8ae9ee69df41
SHA512cc8da8ed53b9ea7fb1092c24c22b5f9e9d370315a559213dee540c50ce3cfd96f8b71d0d9ccffc17306b3fb6bc6f30b3efe262285f6320c966ab689ced3d06e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52695d3a122c18cbf090c1e649dcd39bf
SHA1ca46fbc10d42788941380c3d26da9ec6df221216
SHA2564d806652960e45bf492116e47c9bd1dc019a71959b5d517ba796edb978d4e18e
SHA512efee37cccf0469f9e81e7a2ac1bf479e8350a2735e72151504450ea587bb96425e13eb4df6d7046a944d9627a6055f28e0f6ff58ebdb9ddda58e4d9fd2cb6543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2c711d635176f71e2d81feb53073e6f
SHA1bf5f269a02b5eaf62f5d5bed0c4fd44e296ec511
SHA256fc816448b57ce3627956b4e1e1b1a383595aa036af5bc49b312996de250da549
SHA5126c15cdc2e508998894dad5149cb9f1a0f89538cfe722bd5c30fe2ff0e872fb6fcc97c1a4c743498da34d593d5cd249b40f1e555ead766c6a35b2011ba3951cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cc0996c7c9cd4860069390e8a958184
SHA1cca5c35d362093a467bef4c71b50349e813272fb
SHA25650f763de757a288037485335b70d8483d55b7e27c88e5abf5a9816524b70a005
SHA512d73b2fd2676ff9ed0d9b1768cc1ab301cf744f8005adf1a3224fa1c16c9fab19eb04b6075272f808368244da1f1e0041d26c6fac7c20c9fcf04c8ee8a0eb2cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51604827b3e36ddd190aa76c82afba9
SHA1ee2e0ca0ff28ddc61d2d4bf888ee10560cc51065
SHA2569ebf3db4b51736fbd81c27155f585452c4f103d9f91afa58680aea6a28b20449
SHA512f850ed53f2d177d56d55507936de76785d5bcea8be41ea0567b0bc9882e810782b53b6428923e8435be615687aa457d530211d655cc0a0e086251ef48a3c2620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef9a845529606d350acfc0d558a5fd6
SHA18b72e524167a79b568abc94f560cd41aaba6ba33
SHA2569d977d7a130e221701464be5ae55c65fe810aa1ecdd676d6e70b03d8f50516f7
SHA512b70fd46b736543cda88555d1dec1cedf92cf15d1be5cd358ffe421ea3c5265122e97bded786135daa19880ffddf3a4cada6bfd4e46359b10308d2bc0ff0bb3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51391998a59f82bb599012b69a74e4f30
SHA1a5796029a7c7b380c8c3613478aacfcb11feb06b
SHA2564f34d7f8be664de6e7bd6abd8fc55a7131c4555a7dccd775db71d46d8bd71d5c
SHA512bedb2f36cc75ff46b8bd7defe8d5f7a54b672635c9db90ba4320c325e9af90367c1d2dffd4a235a2e37cfe65c2aff1d655e1475f1d35fbc7e6a311d27e820595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584ae5fa99c71f47bd2d9bf87ef32598c
SHA149797059578e97efca4a5953b0a4116f6e9f9b1e
SHA256be3235f4dabd5b0939810467e3deaf8f567ff0e4f4bd73709b2de86a3b8afbfa
SHA512bfd7d639de97cd875e2696b320e5a6058cff0d7ce3f68006f29d6399974d9603ed394aa15085968720837f62b8533f791dbf249f1ef25dfa109e1e84f9d458f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d4ce02c53c8382598b67e63f8ab9f9
SHA181e29fcf1ea18a84b93adaf52f9ea2c481198f13
SHA2563830a6bc13bfcf31e4156c7edf4dcc1f386124a5b3ea9235662aa48f77424ec1
SHA512b7a2ddc9431fe60186da5cad7f373eec373a32705ddefb50a51c986f3d7d1e84fd88f933293be4662350b64a3353d98623c89a847921d251210f7c91a543e820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe2318a411efa5da7203ecafcdb2fa3f
SHA1986b3400d02684f32c87269f48e1fdc7aaa726f6
SHA256e2f33aa6e19246703e2c50d12179512ac4b611815f01f0f6920cf4e8378aa0f2
SHA512eff9aa62b56ce54b9f38bc6100d2676b604cb9136aaf54afd1076b5d4562328caa80b96a8aa0d56ac7f0500061b0b886f55975c2d594ce9e47c75529c3680ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e561aeb418a92b539d167c575bd8bfad
SHA10199ee9ae6c19c604bed9a6028ce18687aa7697d
SHA2568e85ff9b3da71410f6192f067d5aaff8a81aaf3b28a61065ade0cd5ce4c1895f
SHA51209929feed02409b4a15c6a0634850321e6933b773b9c2ca76958890788206e83d66593e9126545dd1ebe494d53700fda01d1aadee00500fb0f2e4c8b575ed963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567df7bbef4399d8701afaea722940c38
SHA14d241fc256db85b3b6c28e2efc9790ca954ce1ba
SHA2568954402606a707c6ae8b1d7a525258e3d4862c5d4a1f5ffb0cb82ebaad90d069
SHA51236444845067a6e5573ed277a4cecd2275d986b0398e1697b2419f26b358b7a22df075cdc5ccd326fd4363b5801845f650a522fea2af00eb6d8be52194eb2e775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df031b40953eec7a237a20e902f5a51a
SHA14c863c57efa9c79f941ff23e96ef354c5cd30b2e
SHA256e40f143726173e0e274bf0f88a2b9a90de1003ac243314bd5e5ada461947e9c5
SHA51223c7d189cb1ef7ba51f50ff8a501c0434f656ea5102e2c7d5ceb2926308d3e1b98988ed78b6226e0c2aac1f0b6512ff11cc6b824a0a9117b013c6dc381401d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585a091136fc1f7edced86a07fb4ad361
SHA1e4b2dad88b7214b94a2f4d9f316b6ab2873f3b4c
SHA256686906e5b037e8529230479224fe32d1d967d27aafec4df4fca7c66c9e3420ab
SHA512de31a316dcb4b6dcc042d317897fa4d8dabc4fdcfab10fa6f9216553b8ef562b139213af63fcd53b53801fc911af29c5d0e4808c0571ee33ed3f701006ae4d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9828a10ab55cd3ec7f544813061aa8c
SHA1156a65ca890a86ded2ca5273c626988bc8d06b69
SHA256fab7bc8e0b007d8d44f43bb6f9f0569a60757904017dbe125a1919d9960a84e4
SHA512e154466b792ab568f48c86cde8f6c6ee77312fd40d0c3a654a48eb3b82c83a736b6eb9183b407f9ddcc9b6e8e4dc6a9fb05e220d10b68172012ffbfd928b0b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c26c331cd203c424f44546ea80bd67
SHA1dfaf290e03d1d1d2faa0d231196632f0d60e6be8
SHA25607d836e6def7af46d3a35a62cc4b3866d59ebe7aada8990865b8c4c692e448ca
SHA51244c9367204aee97fc32c64e0ad67aa06d665ce092bebfdb517f6a11c2dd13c97a36c7e6b6a3100349718904ed8f86b8504e7f01500d199ae6bd151edabe732d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f663a656c27963bd17113a988efded9a
SHA1ca3c14f0d166b16e86883b9c5ef9dc168deb2f8a
SHA2566f3a2e168381711a92d7bfe599195c220ceed7270365f3ab0a7b41b29846683a
SHA51294fcc49966af40196a27ca002d3a60877c51917336109ebb09cacfbfb1f659e274766849525024d00c3935deb3bce6cbac5151ed6c17e6fbb14d83beb4ecb721
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a