Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
68fe29bcbca2e809a221b3db6249e6a2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68fe29bcbca2e809a221b3db6249e6a2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68fe29bcbca2e809a221b3db6249e6a2_JaffaCakes118.html
-
Size
61KB
-
MD5
68fe29bcbca2e809a221b3db6249e6a2
-
SHA1
161fae320de54ffce6151f436ea1e906b7993a33
-
SHA256
8f922d4065a5a035b5e2edcdc81b0c24072a957f51610877f4c1707f0b177610
-
SHA512
d5bbade950d90208ef74cb6848b81bc979cb4af96b234d94d3abb3534f97f73d16fb60d1b40740388f5a85cf43d29eaacb94c65328ed1473dd8d4a4c36fb3eef
-
SSDEEP
768:JiSgcMYUcXGeCSXuhnNFjoTyZCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/Ijkk5nnt:Jk2RZTbec0tbrgamchNnWC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac7cbbb1e476f544abc64189f16177ec000000000200000000001066000000010000200000004b7a3d5b9536986c44d2ff298945e8abafcee2dc80e61da209c09f27f8437219000000000e8000000002000020000000ac69e569e8e58aa0025e021f30f446e8c496434f1f72bcc0ef3269e3df0b6c3e20000000ed021e47df5a2b1f3200920aeecbf6fefd19a66f32a4dccfeb66aae90a8e255f40000000825cfb59ec6fab30fc9480af1ae76f78675821a0636542f309cbf03c1c1a321116c9222e134db8dff4a9886fd1b380c57a503eb091f6da1ccc4276f3d6dc02ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605e3f899facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582252" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B46E0E11-1892-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2876 iexplore.exe 2876 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68fe29bcbca2e809a221b3db6249e6a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e261702c3b58eb2a5028dde8d08867
SHA18b155a3aa0a7fc5629d68b2e96d4e01f5b153543
SHA256bd0d03729ec654045673f084683295fa69c684233e11b260693b7cad8680472a
SHA512c53e6b3ad08f49ddc6615d3e529c8cd6ae1bfe706ae2ee1255a0b041c81a7acb31cb20bf19f3be25eb37c2fc994af72a5659d2a7312455a8a611bf53c60cb36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc1d65eb9e42006d5cd63a300255c990
SHA1b99d8cef520d24dc5d8c481d34c8562faee0167c
SHA25677df206373e92c7bc96a76dd98eb15448255cfe03bbbaa7d52fe8a35eb5afbb4
SHA5122f315f620810e0737572889848f2d59b45f2ed80cd16e4d3ce4db9adf09b94e4159ff84b6b18f90204d23e73b36c8d9c288855f3405fc41cb20b7cd27a6ea348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e880250508d624b8bd51fab7381c83b5
SHA1ba0b1a14134a14a94aea8767b0a3b1e84f8b911c
SHA2566ccb149ead57dd280065c7e0e7dfd210eebe8678857fba57cf163383d6400ffe
SHA51279ca694f7a5903a392884fb3d1731c6979750672e8144531794524a1c96addbc722c90181a581208bdd5ba97c3c2b1200cdc99dea9f8b84b969ca597e960e323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a35e5cdcb597ad5bf9af0dbb372eb255
SHA19383553e8dcbd3c0d7f98511253f165de4a93896
SHA256dda817ecdf5f6b4e56742fe5deafad1f7836580ad514887da1b9c2d10643ca34
SHA5126c928f2d4fecffddf3e8cad0460bf8a759d1d707890484d4016d146db1d67b72eaf4469fafa5d17089805dc37b2033fdbb8f24a57694b01047995c2128a54795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8d457767b1c8bf5c93324d55fb376b
SHA125b00d57a2777dc95171c0884e942f2713923720
SHA256a369fa9c24b91d83fc9577b5c059cd9de24d5277ded31250a14099911eed79ed
SHA512c892afe7cb0ffa35a7435b88b70364f54b8fe857e28160dc6dc46300fcef69d8e2ec3f9d1493e994e1a8c950785b6feee5cf380b4818763081bf022c9b8c6c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b648b6502d68d83d9f572062a957d99
SHA1adbd927ee2c5bffbc3cc8211044622c6b7128314
SHA256547a52bd6b94c1016eadb0833d668a2f027c319cc7cb644fe102d7de89175b11
SHA512acd6750a6ee23f47609b329f5ede791838303f40fc40c52f3cadaac0fef5f01445e960e31643ccd453cc2c7384fd3f6c28687ff11ccf4b83cbb0d6d547428bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6deb7b326f7c5cf881434b2ea04eebc
SHA1fcfe599972aa92e8aa56b2d39165c367bb2ac4c1
SHA25641674a0d81df80f680b76a0ce62cf0b76803cb24fa73522d9f34436e5028f49f
SHA512c9aa49d6cb356292c914d8fd1aefea35b0d847e3d91942d2829ceda8522e752ca77c1eeefb8d8c96c312ca5511b1f93883d3eee30db798eda2fd696514eeaff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5923db498ebcbfc83be4f87b3df4a3d49
SHA1f81a4d2aa0f9fc7b3192c2111a58b240684db6fe
SHA256efe4caa6979cc4babf54f59d2a0c8342e38cad448bda41c125e96dff4f7a6eae
SHA512cf7a21c709cdb4aa4aa93316b436693bff6118c4c775a748edd432bff4d249c5a5a5b14f60ecf67d5a6ff2d13b65daa39839747ca7ace1ac2f01df1c8bc7e0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9162e92ea4c0a0a8f0f21ca2564d9b
SHA142fd1508662d6eb218a71713e2804455ee03ecf0
SHA256c964361725e8c314d44fffe5c03b19d642a9a62c1673fb343c077fc468a1bec4
SHA512ff0d571f16814a133fa96ab3d0d6df9ccb195dd9bbfa821f38ac78a63169bc296ff94f099e008d6eb7d9b8fe85b922b807b765ce8c8a659f9e64c450bac0feda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559c7234589b72e717c3c39cdcc3b6368
SHA1b27cc215e9b26abaee1174d03ddb3d0efb975120
SHA256ee693222649f458fa356ca16f2999ab49bb9810dc3af81bf178772543bfed2b5
SHA51234b5d4b4f5cbe2374803c1e48ad2995931d2c01330b3fc006f9774268996653c94d8738f54bae6c5adda0be56cc2e3e59d03b7ea03bc6b41c38c50b2417cce7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a4ceb963c434fe8815ff8fe4387726
SHA1fbf16210976fc344f367aa324347e9e062d29295
SHA256a44e888d7055c8a03cc78450ea30f8ab0628876e5ac4edc39af2d007b10e826a
SHA512b97d92b7a718e191d3f3bcac5e37cc732adde125f38e3a7743ed5bb451df1f4f4142acf8fdbfc7034b880848409a686006942d4e943fb58259a7907aed7d56a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ee83f50cbffbc0398548a9a141817cf
SHA1a1455961cda574c376c9b43eeb3d6a1e1a148cdc
SHA256b7f8dfbc2b2aa61299dcbf8c92b4ee622aa601b0c5ebacd526396e271d17bb0d
SHA5125fa0a6d8b69f39e7b2aaa13f63b479e95d912db7444e565387d8825413f463a05429e18378386e6ee3a8301695732d0adaf7804fcd7e2144887c0236a7530a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd4014ec948f125d966b67010e80b1f0
SHA1085daea7d1fd335dd253ba35e21f65f74c695e8e
SHA256b02973b7034defd37341a10e7af762246a9ad83f91fe04834df729058c8c2c54
SHA512ae68e7f037c65632fd2214084238296f008ca3a5ddc68a702bfcf317220f7c8ba7af5f6a79c6d04e24ada9be5ad4ef830ce1e0a7505cda3cccd3a48bddeea9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e320f3fec330eba3e5daf2baf20a78b5
SHA1060c103dae99e48ad0b96584610b6c96b365a876
SHA25601ae12c61fa9bafc94a1ecc3d36e3a593188e7b4f8f70027424f8b3984e6e86c
SHA512262eeefd2ce42ecae8956a211643ae4bfcb08aa4f4d99ec7b556b6d86b2d99c29c11be4e8639066d27f4c1417e8d7af24c11278caeecb0f9e588fbf0a9fe02c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d9f1a0c699bda79a535ec65ce7b208
SHA10a874bd59479ecc3336d8747c1b188849037fadc
SHA2560304f2f41cb0beac7f6092f86e120ccf21d8c673717608d345aa79c0ffba1746
SHA51260d8c7d36fac7ebfb2e62206051d2eae859f4a9ad0722db3f8a508ddc4f3394a9f5d319b10285c2fa4408c795a4f53769ce18944848450535b6f3e481c69b3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58501359c08c7e5c669e8538b18325cfb
SHA1cc85402c0f6f72b461f3713f7e01197ddd932ae3
SHA2562aa7afa34bc43d1d3732634c1d0f7f581286bf751d1fa33a2e09f57bc1894e48
SHA512772da7ef5fedba8eee619aa9eb70d3f1972bcc4c854994df09e807c47534d922eae50781f170df4df473e6754179e20dd435264ebeae1185f31f63e86ba94753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2dc4db4f6a28cd513d2720bbceb16d6
SHA1d5f8fa01a56a580fdc07017ed4e854a49851a836
SHA256179ade8382bc27a048919839e03db400fa17738bab56195bd6b5066fc1616871
SHA5124be03eadb0b82d12be0f4f65270377334acd064f32aca5db8ac2a48e1c20d1fa523318ae2916dd4a8956092899ca96f28e5513aae557758d4b0bb2ad510fb622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab6727a9694bb697eb0f7b335e47d64
SHA120e9b1586b5e916e1c51a016a584506272ad5c67
SHA256378f993ea71657d156940bbdfb0630eda5268accb114534a6067169494838a64
SHA5122a0dd620443d9e856ddfef3121e3ca4aceedc8cfe2c852455dfa523509e93ee407f3993e70f96c44cf1350bfb64f574f8e24813793bf53a009f268cc55722580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad6d03a984de6d742aeb0acc1e45614
SHA15d5c9a9d26f3bf2631a986ac3bd8cc46c75dac9f
SHA25678efb6699ef2ed6a08f7892481dd96be563907eb0e610c3344ff6d52ecf0ae45
SHA51290b15a8cfabb458ee8fb7b3705ffc9fbe9101cbb51ea13b52b87e438eb3dda8cf107fc8ad55cce15dbde1099e57dd78540633ecdeeadacbb74c611ce2c4f01ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a