Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
68fb19691eb38532a822d466b224f1a5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68fb19691eb38532a822d466b224f1a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68fb19691eb38532a822d466b224f1a5_JaffaCakes118.html
-
Size
3KB
-
MD5
68fb19691eb38532a822d466b224f1a5
-
SHA1
6591cae6e4b3314a899f998208f31beb6d6e53cc
-
SHA256
ea3c9021e539c80fa2770ec0738da88f53ac11954e31746de3cab0d245e9da04
-
SHA512
a707f25ef49ef547bd0ffcbf5dd872acba167289a18b21670eef1b37e24ad203ee4d5682b0f9bdb7bea43ef6c4f2f3ffca62514213c71d226ef78d7df7521917
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901ec9bf9eacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ed38f08ff1107499c937028b553410400000000020000000000106600000001000020000000f878c2366bdfeea736a52dabc0bed28863508bd176f3e643e170237a38890f9b000000000e800000000200002000000008084091581862b1889f1192ab2d0e8fad34d9d9164103b22b5d38478220a6e4200000008e2eba6e9e11f5ce35f3c447708173e81b7b229e430b230d91918e7ca5c555c740000000bcc08e82380f59de07069a0794678be1c72bcfba1e670a63109c3bb8663e83bc2c079333a40ab4ca1d267333b0d54db11faf1697fc16f536bdbdf50e68e7ba5e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA66B9A1-1891-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2836 iexplore.exe 2836 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2836 wrote to memory of 3056 2836 iexplore.exe IEXPLORE.EXE PID 2836 wrote to memory of 3056 2836 iexplore.exe IEXPLORE.EXE PID 2836 wrote to memory of 3056 2836 iexplore.exe IEXPLORE.EXE PID 2836 wrote to memory of 3056 2836 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68fb19691eb38532a822d466b224f1a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589a8fb8f463f52f03a24271777fef00
SHA19e2542fcaf8b9ab4e483369e52fde1b021c9201e
SHA2566cb391e5f26dfd8524e321018f2742326e6378978e02d5f523773d31e79fef9d
SHA5124b5797c7d7310ca576f42f15b4d1257849d3900bb3bcb05e23beefa432d4418a1e93a092300914b3c65812bf2d1c60131f4924f55f5a388a7deaf1c6e0e7d6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbc07ef08ce3db35df09a06804c2f07
SHA16f70d7e86d79ce088b99d8cd43d80021dcb1d810
SHA256f1399a2c19d739d2d38934c27aa6914003ee7adf0f4f32f8c2106324876e593c
SHA512dcdeabf2b284da12daa0c4dbddadf1c3bd69ffb1ccc9f14e7ae29fc1589e5f710d25bc3455f6b0b41a1a807b326eeb3575d8fbb85dab66d3a8998605de6734a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ea966799c7b0d877f519fb06bf5d18
SHA1b6c32824ee1b6fea16e0b06704eb454c09580acb
SHA25696f72ee5b7e34b84fdff9fe7e24254691a344dae2893144b3b1dda69ad0899d0
SHA51207c9b6f4fe4b7793e67844c92b2349e22d64ab714196b25eb057713c699f4fe0a393a6f7e6462be53f9012755a4b028ec9b04d2a878d0b180ef47fdcbb47f4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ec1c787edf0bbe904a1ecfc68773ee
SHA199267d527028492342a868ea7888276152a74584
SHA256740423f062bd3771b1672fa571e3637529ac5231a68b77c44dc2bf4343965979
SHA512f1b1a38053c4da932e14e14c98d961f8e08813d8de51b27f30d89365089913aa852ef00a113c91a617a17e2a1e26863bdf5e9fa8d39b4af7e87c36c50949cd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dab12ec0306afe8de507646cd25cdc94
SHA199979fbbfd5929f7e8b7ea48257d98511ac7f4a5
SHA256886c50de713a5a015c9c4e77feae0d845cc6f7defc570c6d8e11ec381496f93a
SHA512ced1ab88ec80ae7c97bed09ac5c587fc25e234a38836be0262e69ef1b774b3df727c93b1474cc4477e1c4f1656cb2f1b8364dfdde36c33c63c439a782a0eae6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50237b62a049291c3e6642fb3c21bcf67
SHA1bb43809786175ef49475c657e2e06dbe9ead6494
SHA256f2e6f036ed67ff2e176260c111be74df523b2b98234765837332abb800225f72
SHA51284a7335f0843d7b2d6f340bf515eebb52b9e69560d33c46b6a9b1f58cfc606d6ef4c5da30c956ec88239f65c1bb46305b306776b8d1c636b871dfee222ed02b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c67fe15993c597df69359520346c9e69
SHA1f369d4c7cde80aa8fd7683cc45085ab272a682be
SHA256364e5fe0df2012af93c92877b37c21a991a80e6e0fb77f74a9336ef101d543d2
SHA512fce1ed9856cfad04e079b5c87f1c33dcf3eeaf9e758f083b16510df78b7a86846b91d0f286610ff662546b9f324de8200aefe16ed6019afceb4a2933516266fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f51ec207e4cbdabda922a1de54dd531f
SHA1c891864f7724627472c1ed2c8532f443bb92fc57
SHA2563f2732322bc09505f7ffb57bea8356a33af3abbf86293f370d79370869a80d5a
SHA5124fdb3bea173ad1d97d02e7dc7dd7899d7172061d90fa292eac2540a34bf20e658c980bedb1e79a98ccea03ab8a7698fe233b84bb40e01aec946910e14a5027c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3c0fd9cdcf964c214cab37b9a33e5bb
SHA1f7e7b4a22a30014dc92b4bf86f1d368a6440c2fb
SHA25673783db5bb0b3fd98112c3928718fb0af0aaa3e3fc6296780018e590a7029b90
SHA512690441ef7f6e021eb43a77697e087719ae8b66c0c597ebf3e516d87d98d2711c87c589a4a3c1092238fff6e1a7456b4f40426880cb51febe8cebbd768941f2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5154bf751526d8a8ba5a3a51a72d19abf
SHA10b6ffcd6ff8e5a3a1da57a1d3db789c67663dcee
SHA256428fb2cfd4cbb456d2100d84fd25be4c5c8c0360d724a540e7495c0c16cbd1d8
SHA512960262f3ee171080ba537211f5244ecc0e07649438aed5530bb6b4d35b98a2bf05abe858db47c59b1dad6be032d49e737e3cb7ee67b007586177716754fc814e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da12f7ba42c1aa8bf3d7b7654e68fb6
SHA175b6aa5456a2b085ba471dec6a3012f176662a5b
SHA256e197778f4a6b63fda73af87dbcc8cb007ab21b3f657ab49ee8fae2689745ca4d
SHA512866d2517d86e04160116e5f946dc59548f178c0441578ea6e7004b479f2b00729c131bb767d7f2544a59be85e820a2be4ffd8dd77b19c4c65bf80e89ddac98ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87b8a20c6c819704fba04c5ecc66e6e
SHA1dc942ac66531d6b0bef6e08dcd549fb9935f2e10
SHA2568188c3e73d5d837591f84f9e6ef833bbfb00273ceb605787b70f03819b1da18a
SHA5124455842e7f187dca53049ccfb8690d57fdd031b7c6f4e7cd52655abd65872c00eee6dfca591024b9b67ba9c50256e63d5bff478cac0f98ef47cdab2dcbad838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d86c65bb04875496fa90b7523794bc8
SHA14ac336cc7ab0acb2fcc815c50c6d0bdba45bccde
SHA25641cd19734f104658d4e787d4959a9f6e3a079ee1ac255b5bdee734c932aeca19
SHA512e1646ac7996dbb08775e0b86f5c811fe423cb9f35ccd8c354fb7283e3c28b2db96d389c65d662d8101df34db0020f036549da56d0a11d29347ae46f97de5da07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8b3f3008377b3f1de0cf9e36e76c1ec
SHA11cb36fdcf1879a210de65964aff6eb5bc13baeba
SHA25696cee24dc35f1504728b512d6639a47566e5502dd57e451fd1e30278109173bd
SHA5123da9514ce7529cab9eb7f04741a01bf206652152d95b996cacf993c4389f92db9a3ccc9f2176a7445def366038c4638f97102a8da9c762b068db88631efc5b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecea891d6f98fcfefd824bcd1b3be3af
SHA10302c02d988416c8adafed8f9bce447c43f7c048
SHA256d4fe7b2932e00c5609de440a7d4e8dcfd8ca27f090f7ac70033855b3c5089562
SHA512cac11d25766e3fc453f3b7c4ebd0d358d5a19525c4664a5e19a203b4c5954977d4934a76b195f93aef1c99cb9f64b7c0e5be8865c99961c25a9ad6e16f2694c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d320ab0c1cd6c43a3060717b6513169
SHA1672c14f81eadce4d6b6fd76624e236b885bd98fc
SHA256b6d9d451dca397d8f0b3004da334d0f41f6585b9eb5df2655f0578afa247b952
SHA5123ba969b82c282ea0477804c6040cc40143df9fae1c8ac0fda20a226b8b1d819ae802d199fba8f86a36be91d5a814099e84d8032a71448bf5a859f7e3e5ddbfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f3a6caf4242e43e3fa1d4c484f5f32
SHA148ed10dee98b8ca73bc699668dfd730263a1b0ac
SHA256d14b84e2ed420f9412865bb7143494f4bbf9f8bd9f60ce7325ec06f65e503392
SHA512cbc52a62f06190e40d5b9cec493d4f5b0534378ed4e3ed42335c5898e10b021de6b572e5d16afd16993440a8247b70ef9541580bcfd980147eb0c3390a89bb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534b419fabc9c1c76bfe891597a54d128
SHA10bc9345e252f66f848393c244972b4b4770f8bca
SHA2567a7b539615168ce6f014739086f9b3e74219e23a5bf16b16d8e91b77a3818ee6
SHA512c6eba69066ea896b9ab059178d96d7647eebf0cd07f8093c9cae63bc48ab9f7747e4d4716edad3a452427a0c29f6b61d02f446613edde41e06e4d44100eb5eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b28f602388ca7088c4197ec058cc3b
SHA125026ff4ccdfadc535f67c59124e57133759e306
SHA2560999a5155b391e33a5a514e176bbe3af1c9b2d36474c05355a32c60513a2b79d
SHA512eeea92c458b5ef12d1abee43c216971d8d8f252153d6badb29638329654f68ff1d64bcb70073436cbb85d5119db53714b82c52308597eb40c33ebcaee8a4cb6a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a