Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
68ff97df7928cf1805d35c25ac03f44f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68ff97df7928cf1805d35c25ac03f44f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68ff97df7928cf1805d35c25ac03f44f_JaffaCakes118.html
-
Size
132KB
-
MD5
68ff97df7928cf1805d35c25ac03f44f
-
SHA1
5ee85e6f96c6d1e2024dff3d2335acea18f11f8a
-
SHA256
004772f1a02233119f63fdb5092cab5db08f6967892cefdb1d89d697f937480c
-
SHA512
935124f3d3ed5c2f4a5405041e0dd567a66a499fbaac77f420d46f1c1654777c2860d731d8f1ff99a7fde7e5f946d64ebf113b10ff4926c5ad549ba569a23783
-
SSDEEP
1536:StLMP4fRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:S5OyRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582345" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBE53E41-1892-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000054fe48a4cf584e41900dcdd7275a1285000000000200000000001066000000010000200000002775f23b943d9c3a996e46709b588350fb86f84677458a013697ee003701d455000000000e8000000002000020000000002c82cf59c38c9fc0a0a1fad24d91f668db0725ec60c9de44f4cd9382b51f3220000000f3270e67b2fd5cf1b81c365cb7e508bcdaba903ad4d1cebe0d2f88452010753f40000000a2da619b229af61033b8686acbbdead7dd39d28e81723a91dda1c82cf05325e6f6725f09dbb7b7e2316da6ae040515830a6d9bcbcf473a71032d16152db45c49 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f5c9d99facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2524 iexplore.exe 2524 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68ff97df7928cf1805d35c25ac03f44f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e443de7ee1d5a9475e53bccfd2ddf0
SHA125f49acb2024f07b1977c3f01274792f22b5d797
SHA25684e439b83af84281fabfad5cd952eb551ccea8811257eb35c5837c24f3e28e75
SHA512dcf98ad360ae1ae47644a5e6bf8ed1a3b51813f66860e0f5bc980a2f137088b7c4e25a5d42f45921e663c0d279091785a6b6589b587d072dab33239704136142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eb41fbf8b5b3f71b14fe2b2eeb0329a
SHA1b06598a9501f961c2bda67c72df985b93b44c438
SHA256cadf43f8365115d71969293d26e7aa8ca61dc6bce1e0fbdbbd4f4e522dd259c8
SHA5125bfc015ae6884914dca101c358032a2b58c606ae944fabcc65a1968e8aed73f56e5ddf19b18c5dc338e3973ba05cd8f06b73a8970fddd9615652353899393575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513ab201c7fde230f18d57109c3cd6c60
SHA1d24d098778f10105ab063afe765c4317196ca785
SHA25615894598053e220bcab5505e7ae7f357c8a158b05757ebe443e06705d5786bc0
SHA5126c7cf1a6cd5433cc91f20d295392b49aae251e555a522ca6a9afc79063f80eaf45e450ab859468fc036652e49a43856cf53f49faf365ce9950a5b033176e472f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5133588bcca9658642028f8d410255a27
SHA1ead866dcfd55e437c336a0b32139bd27aae80257
SHA25693b4bca839f5fe5943cf39155e4c6349ce98ec7cadca5beb697c069ae0324c33
SHA5122e694f3352f69e5cdc909fac133fb2c1b1a21cfb698feb343a3cb3b9bc2fcc48974221e69ed92679fc43499bacc4fbc64b53c54d05b1498df9083ba92b34a27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe054dc7d746a7a4b7319049d86eb23
SHA108d1105256c42e0cd8f42122e042ee345d7ba41e
SHA2560bed9d85cf639eb0701c4e74964bc6c9ef50b5abb78c2a2cd75d77bb8b282a66
SHA512fa3c6a11a59f0727857b1fe2b5435f3cb146138fbbfc97f1a939aec9d6d7ebb5048f1b765601576e9ffd2d2da262e349c9eac98cd648d771e0c5237d6e224e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a68bc43625fbf6ebcde75523bfa3c53
SHA1c3f7cdf2e1fbc5e9a43037098ab05c0f0a9e74d4
SHA2567b23374cedfffb8842ca3fdbb66e173caa5254af7a7fc334a780aabda32682fc
SHA5121281346db0678ab1f0c1f837d5dc580cca3ebe1d270e709435dbeebf8115322482e7b12cf30ecf72d6ee62bee6051944c2d89072d667bdd654bcb18100ee849c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad5b149644dcb9995d6cd237e002ec4
SHA1f70fbddbefb3d95947a7c0ba297eb4aa1371fc94
SHA2568b543ab8456327040f09e72df6c8264ae0568c8455898efab68972465d1f4887
SHA5127baf0eae4225e8aa527b06d951854b01f1dac2e9fa1dc5da59acb38cfe457466bb509077ebf49081df01ba8940f3ed4316aa488ed5ce1bb086be9f29a642e4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589fcb374657558752b38fdff70645408
SHA157a409d161d52b1251b3d5d4d3c85de51e0c0ded
SHA256e83a4f81e4bd82273a707455894f5ccaeceb54df0446e2b599b24d4729d0b88c
SHA5124d368c18f1cbc6610c1647600b20974d44c6ec5db24f0c82cc88cf9cb279bf0999ec4384e3659a1773bfa8672bb0f25f07310da417d487490e4e45cc34a6131c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f419005ffdf023a31990338227ca27ab
SHA139836aebbbeb0d255e46170468332c0c938cc3e5
SHA2560b7d7480f935c2b31aac6c396af92866dcadbaa89195a69f0f6e2cb65c1e2f9b
SHA5122926172241c9a3bf4388a619bdcf05f4539fbed8a7378152a8bcd44ca75d0c6aa80ed23759f14001db46625c926a4bf5778028ddbe2252e663d0e1d96a7dc332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d48797f58d2e6cb69b7544047874d1b3
SHA12758270a090472ca8cc9e44ae561fe6518bdeee1
SHA256b988e2660bd16ff1ab5461e30a3e08d4fe0ebe41d8824b720a3b1dc478402ef8
SHA5129f1772158216d2a5759fef196c68a313d9d1b18fe664bb32a8e898f9fb32caa68d6441a9ea0f3d9e3c767a0f2bf831d50b038b0854622c615f93788aaac9dbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a99e09298b3ff6563efe331cadc6a5
SHA1f2652af0d65d954ba748ebb4439637e132911a75
SHA256e28cdba3d45321b612add27e85c0ecb79a2fc498508b24e930e57d4b1b9a0489
SHA5126f5080010df274f73a562ac3b6600e0754c979f925d92f9ce08fb31016e49953cb10cabd6c55bf27fa4d155617448424baed0af428af65188ced2b5b917b8327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b270fc54bf1a6d7799fa1e8b3659cab
SHA1e4d818a08781a4a401d1c500b677135b1feb3899
SHA256e25556a3393811d3aa51cf07b9efd830933442f52b99853c0d7753f1633ee886
SHA5129a6939680040bcdc1185d37da3e811bc4dd53f428280bc7a086fd7a888155a708f12c3324ad24097bcbac91ad429a81bf6c6b952fe38ead9f433b076d6692ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7f8e603db4339c8eb57f6504690136
SHA1e44a5d3431880bf71303c9dcd9e5bd51e13a5575
SHA256188e6122420f8014acc1b69d92f80020a7a3f16ec62b30fcf763d6a088691511
SHA512a7760a7b0c96b5e5720955e72e88d4ee0d8497aba765aaa73e160970645c0c0c30758b9ebfa038455bc31b33a4cb161167080abbbc43d849334dbbeeb2126368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a60e34a154122ef3ebd8e979d432e61a
SHA1bd77d762aa4f3d0e31202e45063084482e65cfea
SHA256b4082203e142af0460e6ef1d190c9e37fef8759a51e06254482ddac6561c6730
SHA512583727a1ee39f4c38b76e62b08af2341c0faf6e23ee11815f292d54e445cc38dd0082423743c114f13ff40da4933d78e4c2b903a1fb4de4af4c0b2b3348c9de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a44a7f76a7693fa22ce979951559e79
SHA1406bda730abe02c13b59a8b3c6dfc928babc6935
SHA2565a9101cb59999328e11053bda5140a5417963df77ee2e261c750bbfaa26dcc77
SHA5123cdfb412efd305e09b61fc240df515d0a703ecf14a559ce136370c4de45a015c19bb411e4f58672f4c7c98e29032d8b2d40ead960d132de77975e1be01c735a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1226563628037adc8695c1e7dbf129
SHA14ac71d275b997334e1575ca0801d4a70a1c41e24
SHA256c55118dc3d8a2f15a6ee411c087b6b8c6cb1bd2af9ce3361cb9978f5513c06db
SHA512a3337e6fca24f2be2ac9eea79f830ee119c869693846935e7ab7a3a4efdab2b821a52ef9eef3843fa6337cf317de35ef4abc9bad96087a6f17ccd79c5fbc69da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de4b0323ed0b59f91dc9ae09ffae238
SHA12c3efb754e3d0d1b92ba96b7150dfee4f052d3d9
SHA256213f375ec583fd8fb354ccdc508d9cf836f3ba42f944a91110738a28e613117a
SHA51287ce721ccb14e3e7fef6041abc0d673226424feb32a16ae96cac5391a05ff066e03184927a4ec572ec7b0fd89cd1fc708f76a82906591e657714aa7605bf7bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5874c7416d8a7b26a2cd44bdaef92915d
SHA16ee8bcc00bf8dc30aa32daa5d7b9fab983df244f
SHA2567742048350efea7fba98aa7fdaade0f0b421fd9c5ff446cfb821ed4aeff176c4
SHA5122bc16c973006ce4ce695d34ce6f8cfd4156b4f2c8656f0dd13bbce619477e24f81993f44351e3b329f24eb5c5d77128dcdafe55bee1743b24391d358fa71f7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ab961a63475b639727a7880a17603a
SHA1834039303414ff58cac2e39d8059640f58957c98
SHA256020fb42ab6b5aa80528982922cbc51624c8589d7f422a76ebee23ed4298a6bce
SHA51264027e67145c362e3159c7ac9463d49ec716dcca5bcf18a882408029c6d93882669656404bdabc9e12d1303979975f6266e2dfb92a873bd67f08d406bd53bdfb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a