Analysis
-
max time kernel
144s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
68ff4e658cb070b2d5b6932c1d5f1bb0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68ff4e658cb070b2d5b6932c1d5f1bb0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68ff4e658cb070b2d5b6932c1d5f1bb0_JaffaCakes118.html
-
Size
24KB
-
MD5
68ff4e658cb070b2d5b6932c1d5f1bb0
-
SHA1
248fad810912860d16b68373df5674716219179a
-
SHA256
52b392003bbffb5d184de04a6d5bd42f5aa821a1585deae4570cc0b3a9c1aa71
-
SHA512
b440de7ec824050e9e4246233ed2dd53f7050e52451dffed4531ec095c91a414439cee4bd0e77c8ea54fdbe23e7a22bb0b2a70fec979bb271d8b72a94de9bac2
-
SSDEEP
192:WLZLwKQOUOdBRUOpUnZiUdQ/uQe/aImBlp+R9B+W1ThxPi6bp+Y5WafW8OhW1Thy:fGRU46iU2/Ipou51Tbf51T+ZCS/
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBCE3981-1892-11EF-AD96-EAF6CDD7B231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03c97b09facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582317" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000429998e04223ffea420d9c2779aa27ba792437487666bdc07b03f2f9d8bcebcd000000000e80000000020000200000007cb88130be41be84be083a923b80b58c1a9fd1456f7725dbe52cccc25f6bfc77200000005ee8ffadfd898a3e6ccd6fecfe0ddf12c143a1464aeb7b439641ec08d79308f440000000877b3c73c299977909736c3e58d9a1716dd19b824a1005e52289d34242694e6ab5fe993a9aed5238d040251cb4505b8510fe55c9b6eca5ba0fcacb8cfea80754 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2728 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1772 iexplore.exe 1772 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1772 wrote to memory of 2728 1772 iexplore.exe IEXPLORE.EXE PID 1772 wrote to memory of 2728 1772 iexplore.exe IEXPLORE.EXE PID 1772 wrote to memory of 2728 1772 iexplore.exe IEXPLORE.EXE PID 1772 wrote to memory of 2728 1772 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68ff4e658cb070b2d5b6932c1d5f1bb0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2fbdeedf543272d36134ec726b04b0a
SHA17eb82b0cb0a9e4a8434e1c39e1a3e9f896fbcb75
SHA2567691b675a11dbfaf96fbc267f6f84ef616974a0e50d1b3e48e7b764347542a8d
SHA512e38cacc3703a989564769389fe3c16896c715fe7edcfc9ccf9005b3e44b2bc23f6102d28921ca95b8360bb17869be905f21c5905a50d909d2c82b70259aa6564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742bfd13ea4715869c08255e00b1ccdd
SHA1fce1e69b53d550a517c934511568ae65161bcb55
SHA256067b1320695e619af49f6f1f1af581d5c0f0ab77d9abdd9bbd01284a31832915
SHA512eb657812c7d4322588e7b5876ef10719caf413f7d1b38277f3071741a709f770ec9ef95a3834df6a8fd682e978755e1e8ecdd8736f996f71833bc73edda79fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2d3014b02bc0e01e19475a66e265f1
SHA1347a4f764b035650a2b723cd6dfe5da428febf2c
SHA25668619d4eeeb1acf99dcc7f19cd605bdcbdfee21a5e73fb9b18653cec293f92aa
SHA512ee4d2f338c5faa9d1f803b2526d604a019e0e07de1870c73c18f2b2af3ad5bad9a9bc190440d05c8f5ff0af46270680321f11e5cfe26811742180d4c91c14eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e92df0350e6a1cc9ca24c8da0e1dadff
SHA1eb3c02f45353827ea3c4f3de7be816e9e8623a3f
SHA256aae0a6ff88de50f5c240a69662bb9954526293bfd04c44531a34f26cc87ca986
SHA512743df4f3d1a0c9c3dba08dd825ec779f9cd3fdf3ca2ff2816f3e41716d2eb8526e9bf7a8be73746de970ce8121a62879562dbcb7618788c69ee0bb929ae362ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9a0f456bcf38e0229b632f9072c8553
SHA176ccd626a21f7c7c5a7c1750b1681205f2fb1218
SHA2562cf37159f5c39b1f56d80a3a345416acc580fd569e59e002a860ad4b999a1a6a
SHA512e4dee1ae43f187201aa1bb4fe371c5c8ac2ba34c5595f9913addb7752cf91cbbaafdf1d0b3b6464f7b78296597f245812386ef090225e690e7d4ffb813553c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac9dfe23284e75583c229d9cafb8e88
SHA1a76d5dd9e102952daee08e18479a64bc2f82eca4
SHA256c814f6e3d4012cc0d10e45eeef6599ddae539c2eb5b865606ed037ae064eab03
SHA5125340a0244853ed00ad777a159066947765f15a501a8e9d62a67ceaae789683e95a77ac2a9f2086d5a5e9b80774c72908e9cf6782a5eabd4e3daec3adb331b7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf783fbb9dd8a220de90819ff237c77
SHA1d8111758fbfadc4de31a17beeaa80a5c9e72b036
SHA256e7793469bdb1e5821ff965d96f6bdbf624191daf13320bbda1b373b1e229de5c
SHA5122a9fd6e9ab74dd14e45d5a01799a995297844f56748be70c0ce98e228fcf062040e70f241363eedfc28452d5dbf94bf03d01ae657b14418adb2746d74fe29d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b520cad05e2ee22bf844ad07b0c7371
SHA1ff828da1c788cc3311589fad4dc19561eb49887a
SHA25664ccb8401841b5ff0c9f680f0c0208c16e211265f1e42fd8b32da4287f0a1612
SHA512a9b47ab38e11d56cb27b4cf30c5b25f1645fbb44cf71f0d26f668cd9c4cfcecc01d5f726c1ea8e1536bc315a8f4216c0605ed6950eb439fa6b082162385ec711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70c3367fea5c8576cce0cd02dff70f2
SHA1f664fe2ed4e3996e801044887c317889595cc9e4
SHA25622f5411d9ec0c6183978d0ddfa48e3a41c8271e010c086a438bebf0be8d51aa9
SHA512627c9b758fe78e6002c0eca2d124d2631f371f6d361c93145138c14b069d76ccdfcbc8b2277f3cbdc3c23ad9a53992cfcc530ce59134c4497b21c1270cb6c75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffec363d66a5a3767d9cbd666ce56d5
SHA155324b71cc8b9dbca68037bf64760a2688295fa9
SHA2569e523aaa56f9b71c8c2657d463322a5d87f2625436340d3d16a4a25c9dbf1615
SHA512a16cb0aedb25c42a299a3a12956cf7cb71277ac08e0c25218ee33d24cc92465977f1dce3229d45b957a0dd6ea4007275293d2d847439e1fb68a42a0044592fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74801c609daf4e5e0e0ea34513ba5f5
SHA1861b43bb24791e090bf599592c66ce5120a0e855
SHA256082c1bb7760a3285d7145576d059f88fec27af20100abb3094d78e9a195abc9e
SHA512c65bef07ef6853a743211ef89414052dee844bd5845bd42a0ce1afa029026d517b4eee08c25a60ed09d66e4837e62d3ff737d9a5b8e0c884db75fdce218f5ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f00ad057c710c8ea1d1c3df1395dd8
SHA14b5310e788524109ab7021614a8a3c18c80e7b85
SHA25620991c80742340f0a4992a0d1118f7abf68d704dfed1ff2d114b68617c511877
SHA512cd336b2b3a4160146f1b1acef506456c587130174681eb3fe2d43749416f08686172f5fb25f807d6649409d52b2a776efb1e7edf37742bb2077e15d9c8034fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5877ca6293f22f216c8f7ab1fd7554fa2
SHA1d974025c383a41ef619a1d20867716dabb56cdbc
SHA2562241e722a38b786f15274203c7258c21204a459687b34735b0a284231f87b01b
SHA51239cdb6b70fe5b73807eb4fb013ea90ae40bf4ef7aac692540b897cafb73e25a6b6f65ec4d872c0c11a018c53973a80e9a0e52777d47bcdc4dc4dd3a58a564ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5488898eb4d708db825ff368a94d02486
SHA1eaed5101412ea5248182066f59f27bbfeac99979
SHA2562d8954394aa38b0ba18235eb39eafa6f76a3e8aaf8dcaf1cb187b47459e520e9
SHA512f27e72e2599af07e21805b4bb6b402f271f43e20930d7d06a70e8997c59f9913a8b42feae337fb12ce1a92073e065bf4e96501f714f637a8ba5932dd0db0a305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd18bb0482fa78b1bfbfe20d325f1e4
SHA1af91ba9db1f61704f96f2a7039e3d1902f8b8f4d
SHA256c4cd206cccb728f94058ab3b1c1520fddaa72673495b6e403f74311b12c5bcf5
SHA51220368f4019b3ee5b509456e9c9816f7c0c405732e8ee3ac3d1f23e4e0992822ee1b9d366caea21dee7e4be44ac73af33a8034b655bb06d1ced151bb9f58be610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b691cf8f850649f6f871d9c8833bb75d
SHA18216097e4a68c106ef78c583cedd6f2c1221683c
SHA256c30a15e7bc1672381f74d48e533bb3247193bb187a6d058ce0f62001d6e437a3
SHA5127cb0e04abf5cf3c793227010299483709a4fe18caa60563a505c0dfe1e21a95c93cceed37079c5b310db0614b9b42954f9282c21d87f98b9ec564a9755dd8213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c360508e109b1ecf57b008db333669cc
SHA1d3a8a2349ef86481893831f1c498dd771674d630
SHA256ce97d63cea3206c206fee456ad45ded948e15acb3deac9c12cf40bdcaa22ba88
SHA51211c0f87865b0efb1b6532ff8420f65b025fd2fedd226fe504fa175d7b484ed600aeab427ec9d69b5104046dc0273251ccb8d9de248d187049a44f6a27adfad2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576230a5fb3312c25bb98958f76a463e7
SHA1f093d9147c735b3bc93efd8b26384b35147beb90
SHA25690e87196c40ea68516628e6d69abb67e7237e571eb034979a82a3128efefe335
SHA51296b94f0b2af72be8a146f3a5d12739680281c22a2de745f41555c68aec595783351d799759b628e0942619881fe8759457d7be075eed40ececd3d05d5d6a95cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed09326b46357e3cb95a1a71ac951233
SHA1bfcbce4ccb1025cbe4816333c8cff3c30c332b1d
SHA2562a4a5f201028aa64f5c68d197805f0e49ecd434605c6aa23919567594e9341e5
SHA512fbcec902a819ddf6edd9ff38d4bd643f2bd38542922d3567b7a1445707660133b3a2d1dd1a2be82c51ec040aa01a477c2d0495ab71d8a868d840a9d78b46a88c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a