Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
68fd4bc116146ec4321190e6c1668fc8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68fd4bc116146ec4321190e6c1668fc8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68fd4bc116146ec4321190e6c1668fc8_JaffaCakes118.html
-
Size
20KB
-
MD5
68fd4bc116146ec4321190e6c1668fc8
-
SHA1
36f0c46e6f334a104f941a10f7da7db23f7b1f15
-
SHA256
6927e60503667619da2bb6695a3455bd6a70510f9464f8177e15a5a097af0125
-
SHA512
80fcdcb9005b1012551e0215cbfa52469ddd603337b933a0880a0201eb8276c3563af11b33b7b2a46f5ada1348714a3d17995fbb8a73556c81136b7e5e69dda7
-
SSDEEP
192:SIfO/QFWVz55Xunm2J+GYUTlnZxEsjESJVViqShQtJ9VbumiY4ZnDLBmee9/G2o6:SIYVNxunm2FqKnu/BLBmheFto
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2065c4569facda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582163" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f000c6d44b16a040a321471a8cebc0420000000002000000000010660000000100002000000085e1315219bcfbe2a2de7076731924d21b05ba44fe47674951d14ced1eec550c000000000e80000000020000200000001aff675135c9673d2e52ff3f11ac07e161bec63be2b42750798208c8c4322af1200000001ff964b3a12bd687276be04a19e0dbea99761e375fa03ea051e495481ee9dee340000000fb9b496a2636ef8b79bf09e537b813316088b8184bd4a1143e4b283469e9b31200bed4f3f9fc3db9c613777af75197260860d5772b4eed9e1118c9a267157568 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F6107E1-1892-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2464 iexplore.exe 2464 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2464 wrote to memory of 1796 2464 iexplore.exe IEXPLORE.EXE PID 2464 wrote to memory of 1796 2464 iexplore.exe IEXPLORE.EXE PID 2464 wrote to memory of 1796 2464 iexplore.exe IEXPLORE.EXE PID 2464 wrote to memory of 1796 2464 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68fd4bc116146ec4321190e6c1668fc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57197b3ce89ba947f66e4064ea1b538cf
SHA1852048f65a1e7f6716fc15e6b839a495dc1cf10d
SHA256978b04243948175cea6db2a6e477fc15e4626569e9192101da13b9840b896f2b
SHA51204ab1b1c24b87cd75e94414432020b32f679320ae453f53aa04b2c412c0f347d63c6253cc163f31ebfee6fa3d9fe785008cffdc871e0d16af1414c97b3c503f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b511421f1f858ad808275e54ffb698dc
SHA1955c2640dc5e2be77f680fbf68cf0e57221a2519
SHA2560717db1729eb684ee881b3e0cdbae4b2c637d1e86f705e7bfec7bd6f57e4fb0b
SHA512f59d70f80e583838ead59546551542a3fd727449d0fd45e435352383b0f2bf6094f7017ec7e31cb1d628fe93a396ed219e6b2c8cbab25512113481b0dcfe6e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57607b934ae8e580311bdc824354f64eb
SHA13018038ec44d9124dde2133829e80016a8b0df6d
SHA25635ae151371a0c4f05c5ea66025b5daee4600c00ffc83d0ffc9ab389f60eabf52
SHA5128b340c137fb14191bd66bd8a048f0828252ec1ee6eb348d0c202fcfb1f0219381a88240c0cd0f670ff09b62d68c7d6ee19b750abaf267d11bee1391cb434375c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55aecc9b453658171ea9f7870ff518451
SHA112102ae25d300e6df226e1729977a4a35b922270
SHA25643eeca3d8b9dedcfa87ce0bd5e4696dcbe0006716cc9520f6efbb36731e41f4a
SHA512cd491a8be72e2a037706d051172083f73f6b8a28b2f20389c3665769056ed73873058dd837502023b2a8388d43db8690b3bf32d8c54108eb3ed2ea82b3d0928c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD548b458fcb1e17d5f9e2c49bed840cc94
SHA14b33bdd63ddbe2f7d995f74e5c59eab751625e28
SHA256c74abdd7429bf67abb372e90cbcf0e3caece28bde33ba76bdd2ca88cc8eb51b4
SHA5122f4578fba53a51d9a88aa74a0cb5ecc23c1c9ff567654491d585d4282ae5ecbd46ed9ce3f5b715fb84027bdf0a9177315ed9db22e8ccfdc01d27905d45cdf3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b43af6a21992c34c90cda5fb6b118938
SHA1b8aac34a0ceec0820863de468532899b86f529fc
SHA256997074fcf3073ee817b0a472a65d5f007fb9d0897a50521be0752777a3a00755
SHA5121aa6dfe3a65803390d7c78e88a200edf66927993a53cacef83367e4f01e782fd38f04c8b5a7a38c0ef99da92be27499929ea785223dda642cea117ccc7643fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a87c746478a4bb1a62000aa06eb6b938
SHA1fcb391dce9c42696d30118e8a15ba55ab4a2ba9e
SHA2563e9381c8377bddd14a16dc5aa52795ffc33ac79e47527c1d14cfd8e89163212a
SHA512792642434c4a0e44568f7e296b23e86bf4277a577834cf7adf5ae568d0064f68b09295daf4616327f164cf51e9845b82384ba046e3d885de7fb64371ab28bde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51469b1caeb710545239e2a860c0dd292
SHA1ef99dc287bc4363883fc4009ce486e411529c22b
SHA2562f0384b6772d1a7faa04f2cffa6320ed5bc8e8cba9a005782b37c3cee403d67f
SHA51275851bda0bf242a0742c949af00b7c18616a43794ce1d728f1aafac0ba56fb0078795beae9727a77f47969e5d828cb805bb7382bb8d1f49c87c3114d9017dd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58637b8b2add9e0a6f76dabc34abd1e46
SHA1d780b5993b0d9553035a89b712b6a43c252ecfe8
SHA256eb8c952630d4120313116fea9ddf0611fd717482990c3d7a4337b4c144e0360a
SHA51254c8444a36e0456010664b823945de3da7d12b92c0984f2783ff75b5e6365645e95781d17e253d22be70c3a75867e7c5771b16dd88fcb4149beaec086db68605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51363888e61d7bb7c91fb1df8f3dcb629
SHA13de221dbbfd7bbf60673914f517ef79351695129
SHA25643efdc576309bd96943cd101fdc78f7fe5a823485475a2a3c86349cb27cc70f6
SHA5126c60054a7e057fc54e2692fdc01b72ae85727f0fb3604f4e0965c3114047b427da41615bc7e47ba1736727c6cf133d31c53bad37f95ac10525e6a695c677b8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ff3572d07ad3ba7c09e7a98a5891f0fc
SHA1f3bf88f70fcd53bffe2c5f42a543ffd9368b80bf
SHA256e3a1d0307a5c70a19c933134f957acb8f3736e4f40b4c385c6e756e2abe4d75c
SHA51268f6b8f4c820fe688fef51003060eff1370fb3ecea6179eca007a0ea45bc1ab19a0202ce8828b220025d3abb54d3b3a53f516834adf6777933db8785ef66f91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55a3131336c805a4a9cacfca3f2fb7862
SHA197bbd736c5c66954f3945037e5aac2e725e286c2
SHA25608bcafe05a87d1c6d3680ea987b599d9de98c840dd1548039c1128da2c9b138c
SHA5121d9b1cb16c1897d31c5ffb00ca711f759abc82e8f3e77d7aad49307bb695a30ce35e078df362691e75748295ab7b36bc6543820125da978c66963a651150acd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ca058211926322b39f9f96b88e1eecb6
SHA144d8cad942446213c930d16092633423ba9663df
SHA2561df730a24705a88b1d3a0c64bd1b96a76e1a71703b20f93e099f980e4c1cedbf
SHA5126dd7ee8c4742b8a410a4e269db79bf1600eefa33bc6e0db15bd42a1dae913b463b922c64397e3b2cb46f654ddf18eaa1d9dc6eabe20e5a8b8b9106b76a97a358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5881fdac41bf60be99af67f1ceeff4322
SHA15ff5614e7b3742f768d83c00b7ac98af7a8efaa9
SHA25620e12556dcf62e0fca59ad232ae3056121ec169e316ace907174bb6f7290b51f
SHA5124b0287992c55d1e85fa916636cf7cc64fecba72550bd18a069c3cf159a8645f9760a598e0ac03b25c08519b0f2f0a4d602b28fd9aebf24adf207588649ae0e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53fcdb64d91c86b072ada563f623eadf4
SHA13fadeae3464e068e8528cfdd7e2c1a248ee83307
SHA256b062d5a8a8837a70a3b4a3636a49f5cdd0679313d8f1deff6f1a533730940de3
SHA5129e39193157cc8704f283faa8cc2a428fa1ead22bd7397d3782dc185f733c8b51c10d49b13521d7ced36766708ff93fe592e6d2b9657fcc856cadfe1dee206518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58ccede11f606f629226069c1564c51ee
SHA112955e47b270e8c88ee8cd80e4d22e1a66a18f5c
SHA256bf86c62280aad9ce9141bb15f3c1bf674ff00fcfb5d80c2b8aaa8f3d6805c219
SHA51264c6ef892870b2de5810cca4f20b7833089f2e5b3ef5aa6749de090bbedf6ef24f9d9a223a5d474283f6eca9adeef70ace207c6a37cd14eee87e4e0b38905d5b
-
C:\Users\Admin\AppData\Local\Temp\Cab3B7D.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3C6E.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a