Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
68fe20efc556d5d7f23a3fc0d72544e6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68fe20efc556d5d7f23a3fc0d72544e6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68fe20efc556d5d7f23a3fc0d72544e6_JaffaCakes118.html
-
Size
1KB
-
MD5
68fe20efc556d5d7f23a3fc0d72544e6
-
SHA1
364201db49132025e6babca2ee281eff81abf58b
-
SHA256
89ed110f7ee872e1fe9344e65582f8b511bfaffdef61fc9e63e28e22b1c35be2
-
SHA512
9b79d623b0b75e1bfd9bfc67fc560866a5da14edc1b492f775b5c9a1d561847a2f348256eb892ca33d8fc995af7622b98343d2720314977698cbb5cd1e5e713e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA58D131-1892-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8ff4dec8681964c9612eefd2caf2d2600000000020000000000106600000001000020000000ebe8b9e0744f7e514d497e85bf90c6dd734ce1112fade62883307865ef339df6000000000e8000000002000020000000d270177f03cd9ed9eba14b80eca3577d309ddd48d86472274fb59b72140466dd20000000de3c85742846b3768dd29d8e8895c14cb7850e8cf39bc24618e72ad98151b001400000009c48f86759b9eddeecb71788c088186fdb31533d1b6d6ea3632f7eab15c6d38a8810005609cc85b3ab03eb8945b226256feb2e80df6f025c5f4e9e40540775b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6088f77e9facda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1096 iexplore.exe 1096 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1096 wrote to memory of 1816 1096 iexplore.exe IEXPLORE.EXE PID 1096 wrote to memory of 1816 1096 iexplore.exe IEXPLORE.EXE PID 1096 wrote to memory of 1816 1096 iexplore.exe IEXPLORE.EXE PID 1096 wrote to memory of 1816 1096 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68fe20efc556d5d7f23a3fc0d72544e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD590f670e07fad9e37af7ad5460e34d8d1
SHA144fdcb3ce890603f79d66ee3482f676032077cfb
SHA25602ccb199866d29f3842015c793c5181505849d65571c197041f2f9069eee2a42
SHA5122d9891628febd9e2a85d9126140b778069855c098782ab346af07de6ea3fcff5a0566395cf31af5fdbad2a53d57c420281e72400b3658f348fd4392938a6b0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f4fa8a937595ac4da4dd85dbccc678d9
SHA1b28dd740de01fa706467f40267101eb9f807a9e2
SHA256e0bfd8b453a534ce1db42ed0c3d7bde9b5e16929dc6f1ec1f20d5fd0ae2f7e1d
SHA512ed19741885eb5e71fa3df3daa1846b9cb1e1c5de1fac33a77c3884f537d2df249c82428b8e3bde632d2cae92ed3558b246e7a405f379a674a04ab5405481c93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55e0e163ccecf62c12f244d773d4c95ac
SHA1b4122a28d50b88443ad463e05aa7b79b2bf96b0a
SHA2563fe94c6fcfdc90dea8ed1b730ce2e346327d4ae803238526f8229de04470ee80
SHA51278d34d99559bf29419c24ea43f55e61fdfaf8f8fe934e8da321fffd1b1a85ef2204037cf02abd09cf8b2e3e9e6da7efbd927525b2ae36bbca25d5d04c6a24d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5080177b4aaa45a3b8723f7958fa6ecba
SHA1aeab014a272de5cc56fb49ec73d3e32cde4b9d9d
SHA256e86e00d7ea34a7cad711726813049e50f9cff3ee669e1ead7705c3acd7656f4a
SHA5129fe36d8b6fc6b4f5c6fb3acc77ec032cf4a621f96ec050a372cfdedf72a9641193ade3875a8000f4fc051a2247855c6d4bc8737c591cd5fa704cddeeb71ea42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a44b5c4056d72a26a5f30f58d28b8be5
SHA123e7e666490970d8e2ca91b0366c9dd65f370dda
SHA2568466731f4360b0a5b6adacc590f50a083e05782cccdcc326fa2e58a7b28c8eb9
SHA512dab0217a3b672394466942f43ab73ae55eb8bed872d44416d0eaae7a04945f55c69b3b595f9b11f7b590eff8225097d3ffc9a29c6c819fb99b748c12007237a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD502f53a10a9af64f9a9506f6c4b2ad0d6
SHA18ecce9c5b5d1f176976ff58e8f4d92a01a495fbe
SHA256b72c8f27b1013deab8db4ae776b978389d01f6dbd660324952490b5daf489d0c
SHA51232555514810523c36eebcc9436195b7efd8426457d7e8f9e248b4ab42a84c6f9ddee6f96bacf844bebcfa301d3f59f1ff8d201386499e779ce22dd4579b268c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD560fb9018ae15a23a7b57bf7c2cf490e3
SHA13de503b04c1aa69f712de4f96253ca234f5026c5
SHA256c68dc77b01fb444eb8cd5e33afa145bbdb70c86cbc67972cbed7fe3029b20e68
SHA512e8b7419a4ac582b3b3f54b6c496d08243fef049106a04d0def394ba4a04af5def3b3cabb1368bbf1ff57a8274f07b19e6ac3f0bccea79705549aed1249ce0931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56fed9e03c4217373b0c4a9529984c2bb
SHA1a407504fa20c56fa411e21deb69fcc7d68c29e01
SHA256ddb5cfccde5d5f827e9e72be3b795d7cd1906824b56bf91106796d02e635595a
SHA512e5a0c1ed4d200e90918de41b100bdbc2c9e277a4bc30b04e231fc8d218e9772832e1a9c6a186e86081eb9ab7a8cdd0c05aeff49022bff130024cc261c21aefcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5750c9ab55476619e920518c4797928ba
SHA10fcf936dae50078c6d29a18b5b16d2303a889619
SHA256f230e5474472600950b9a0b1d6cbbc70a1d01a8d8c687bbb7ada3d5850467223
SHA512b8296240c0ba2c64c88a01163ebab3c1377e6263e41b3292c806c798eba8f4f0ddf94aec1f883b122e607bed490326dda68c98df829a31f21dd640ef41c5df28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52de4676a072900c70ce60d4440f8796f
SHA1d4225674ba5364ce90c71f632dd746d4f2bcb5f5
SHA2562621d70d55e60a8ec0eb32df3c4e90be5cdcf23aa742bb3fee328fddbe00207e
SHA512acda04edae5236110b6e03e9b5f85a5ca68e9e4ac9e36205cd97e215d04d8849714c38ae31205d9b415adbc946844b3f0e42b8aec158fe1f7297c8be9e564092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54f1a5ab283e1e4d2e1b293d36dc68ff3
SHA1162ff6f57dcb05fd1899adab7f48d960f704e270
SHA2560710d8c544a7b9b85c6f4c5b3f252dd750603dd2be7dfbef283d44280b8d7aa5
SHA512e7bf2c3d2eae55b3920fcdc1b60ab2819feafcbe671a1ad3029bbdf0e9d94844d226e1ac19ab4d2fa9ceaba95c7d494c700318723e8df5731f71df141b710368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD525eb96e44cb6a016dd69c038aea70325
SHA11532f8d4be9d92fcf02c17b5802fb818077b8046
SHA256eac7c59b5019439593dd7e993824766e89b640c11c69b379a07aedcd18430fa4
SHA512f6b8435f6960ee5cb161534d49c1a2930ef57908019d023a3f16b7d3d86ed4239dfc06db74f2b5f4d931ea4dc29c40dbd944102285dd3599cb66de3d6081c04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54cfc306aa1cf55cdb3bb98c87e92a4ef
SHA187956c4feff24db9da0accae5f589a60312c4aab
SHA2562139abe278c5f9c9f240857bdace640f581a21afba51347d9c57bb249026e1ff
SHA512ee3272189634072cd3607887e3988ec9a8f97204cef0326a76551a5fe04a1df7b73d8401fb8d0d288f98a4690180a77bd86716046cd32ea266e2905075ecc6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55bb93ad95a84a995a13e9c9edf226637
SHA15a53152351c14c97a127921f9f6e492839532dc4
SHA256758793cd920b477d43d91dec40562212a76a1cf234baaa8e966b21ab0c98ecf5
SHA51272dc58606f125eef4002d477f0dc7763785a2c42ed42b4bb95eddec809d024ecac81a1cf0d8b459f0d5d89add2761cd8a62f2077579959a117b4503a97746a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eba1d03fb54a5e1786041d2c82b829a8
SHA178d2d605b3088e122c2d6fd1450aabc6a3af342c
SHA256ea90f1daa7e93be7e7a25ef5646a36099c078bb88e279829931bf28e92e16239
SHA5122898255e43dabb7d3ee37e65c9ff84f0395df39a1cf2a60cb7368aa8ddacc8fb3fb305c2005dc38135bc2f40e696c3736b53272214f7ec20c7ea9c5a8d45c9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD538764784dccfb07213fff7d0cb4895b4
SHA1b460571e6c6ba61b2791be94262dcb4ccd28435b
SHA2564b7455baab6dc1b6f6b76510f6b37eb4558250c41dc88dff0f7342fa3c5b3c7a
SHA512918b2b980aa95ac16e0687af496bff559eae24370743c30904abf9e8c5466eb899bbf50f84a97592cd02bc75c9a5a27513580023b4679d477bdfdcfb71ceb252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5112abbd75ff7659bfc36044ab60d87fd
SHA1547b862d4d482cb151f3d76d528569f0de7174b3
SHA256861de0cf33588af640228857ca0433749b177e824c40f3727f81c2cfc05e8a35
SHA51285004b5fa86e0ab14b2ecc208758c52de9b9f25d12f3df5180e5efbf4dd38229f656561661a3210eb3121818a12aea1ba2e23a468ea4a4d069acb413c7aeae63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d5580fa8998caf1cbfd7ff1fc8c871a0
SHA1760bb351a9d7b384b7d15c5f07eaf0bfcb8eab6b
SHA2564ac19ca829aa7201c379063ee453470e3c240eb4e6a9837a81b10e6881a7d74c
SHA512fafaf6d043db37a47a858d909686d71c80101d125a41bfdaead4b753cb3a9024d81139931f3a5b33d994b23b160dc38b7edecd93723ea67911584ec8cbba945a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b4fdbb8181df4b98762c597080f05e78
SHA11aca2d4be1f237d7107aeea21f07e7c3a010ede5
SHA25623c865e9e171983dd65ad5cd85109037510edd1d5a4bfc95fc74a17cacd1c9df
SHA5128091547f093efbed1eaae475606ac4591dbc14f1c9a15bae160dec66c59894c063319da2aad77fa3f32cde069c524a120be4aee71f049d043bcf71d2f07a5017
-
C:\Users\Admin\AppData\Local\Temp\Cab3A91.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3B94.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a