Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
68490643b262f666ef9b49e9db4394ab_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68490643b262f666ef9b49e9db4394ab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68490643b262f666ef9b49e9db4394ab_JaffaCakes118.html
-
Size
14KB
-
MD5
68490643b262f666ef9b49e9db4394ab
-
SHA1
784e74b865fc89dc0fc29d1a42da2a8b037360e1
-
SHA256
acde7b426e08a1ad7e31116596adb2122c506c6dc08e3522c87eb61008d19cc9
-
SHA512
c22348c3a0d99b0f1ab18fcfbb65706ae7e7d7b24d6c26224ce6b8f442689578aed1baebb8a2771b3b196b57235dade665e94b8a7ec16c1ece98bfebc514d8b0
-
SSDEEP
384:Cyi235Gi3rt0RQFAi7sy1w4Mm2c9/sSFHuI+t1A:CyiWjKRQFAi7sI3MUsSFHPe1A
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01c0a777aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000026585535a9e7c5439e562fd643d807d400000000020000000000106600000001000020000000c3f16ee8c267033412f8537acbcf1b0f5e3bf93ac5884daf6afd00aa62c18ba7000000000e8000000002000020000000df0ac417e223b5c48e85da565fcdeb7e0c77199376b4821ee9675b0b126f6bc520000000798323a7a1cd14e574ffa3bb7ac17ca65af8ceb89cc4fadf59ba142084ebd3dc40000000ea9097c72580e00798dbb74c80c3ebc83037fd8188c9dd52a16c91529b80c47eed9403f30da9c01c18a1349f1202813597eaa2c92140bfc7eb8a66fc59df8c31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FC60781-186D-11EF-8840-6600925E2846} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422566325" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2264 iexplore.exe 2264 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2264 wrote to memory of 2728 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2728 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2728 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2728 2264 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68490643b262f666ef9b49e9db4394ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52603801e983a61aa4dc98e612167a52b
SHA18be824f5a13d9cb0ac2ad7de83b5ae6e2d279a4e
SHA256f8641d697c5d97cc48f88afa1238601a79542019f030aae765488f96b08f190d
SHA5124bb91154294fe8fbef952d6307addd93f9756cd2dd083fa79bf8f4761b6d346606d5096c9349341ce1d411b8fffac9ff51166d42a558a15ce6b7a75cb7990126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d46bdbaaf9b75c8fd3c61c91b37d54d9
SHA1e37798658152850b9ecd2383c033eff561210c41
SHA256b52660acaa01367e401f0b87f1742139b4e2d16f046961285f890a8c07628960
SHA512c700986b45cb0f63a5f8be705257c0fa36380e3ff5a15a538a36b0d25359cd4d28f40c3cd896c9231c8b20ea3e6492129afa2f1344834297b5f8f0470d2b030a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a7d76520e33652a679b7ace16bea7bd2
SHA1fa8ab296f251387866216a5e7d5d3314453d0dfc
SHA256cc78aba8b3f0e1af756081d06a8455a675ba99f24cd1578fdab688e46ada41ca
SHA512c6b2d360574b60db7161fa092044ff388fd0cd9cf491fd88cd5e0c8061d08f308a53e0efbd58d395acded938d20bc1c8b4d7baa1db12c38406ad4539ba4d1486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD505abd64f0a0fd8acf836e1096c5b60a5
SHA120b32d90504bf382a2218abac8dcce0c35e56492
SHA256d55b817117b98257bc5eccec23363f2fe93e9ff10cd87802c2dacb24c43d2cab
SHA512edb2a9d9850e63e05306c0d16bcf572fd8ea962e8f024d34332a3318bdd21f41b8efca36157ddf90a34f9e13e4f227ff5bb350510b6a3bfaeb581de13b55e053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ec661ea33e1994c3d6f52c2c5c032ef
SHA129252e524a692f8eeb89dceb62231dbe03b76d70
SHA2563bcb0b41850dc048a5a903bec2b8216d6dfa3cdd0a2eca4c9461112fa1a37d07
SHA512a9d7db61b4d1a280392500bc5cc8c1bd65cca2d129979704eb903faca8c581c658e340660e2121599ecc78e7fdd3dd28180810fd71aa599f1f21cee32b148545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5443072f00549e1305844e45acb09e67d
SHA17967639c267d36604d7298431cdc86f0729078d1
SHA256fcc5c4ee73a1b02d0905689487da9cfe0f5a49e4886a500e20b977b16e8b60ea
SHA51231cec61d26a81c158e68970e055483fe5f107fa7bfaeb0062f4fb34c2ea92047c2d276b0c2661b50cb0347abaeae719e6ec915dc8165779d7e183c254c733f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b09a425bf0d0510b6820ad54aea2ca38
SHA19875a2e5a3188cea640b859ee649fbc01e3dc115
SHA25625ee87ac867a5a24fbb99263d99e142e7e4e9baa2b56a4946f45cae12bd4d6ce
SHA512467b11ff694ba575d97454bc7c5f2374105582204ad7971f387e4c2e4f50a25a69a3fafd4318eb7916aca14671bdf4a98eee71e474cee4f531bb3416a9bb4e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a4dd45be2b803b5e2ff66a193569277
SHA10bb24d3ba834ea2b28f2c2c891fdbf2af4cca1d1
SHA25616898a31d7e82e63e8acb30190a340ecc8fe3c6d4561c5f7e5da64f417299ebc
SHA512600a706480afacd30e4498557152ca377ca6a70ffb5515b45f85ad5c41e2c108d73c9459f0027e887e7b7bf77b0f8e0d165384861be4411405372aff5aa1ad8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD564176d156ada6a6fe8ae52e6cbbe0d00
SHA10589342c130da1e981bcf16e82777945a408c21b
SHA256a4300f5e379c655030a8795030eb825ef8759786169520afaec3f38f82e5cef3
SHA5120780a4f974e8053fe26ed7771f67b9c0f1760fde8757dd6cf0e482f7171ef463bf614c01268d25ee9d011a14cd231c6aa30c56b40004dc535cf2b52cb7cd7b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575252d5f02757faadf9b77ce28356709
SHA1f94cc73f8044eb1054f46326ac70112b32270a02
SHA256fffc2ff6ebc9a34e3f6d3949a083d36741b94d80345944e398fe1fde36a4fd92
SHA5125dca4b06de166f48e4e8edeb2193d01c7b6e1399be64cb6a4412f96435329f6f8c68c7df953ba29f2a34f573800ba7eec0dea07067da88616184be2de1356058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6e60e2dad9310eac53ca4bb0596d09c
SHA1acf7c2c2aad964509db2bb53ad6a38dfea3a1ba5
SHA2560e38b7fbadbc56bd0bc66e2b2a26e49c6c8b8482c6faf362a47e752722d0504f
SHA5123c2dbcebe4e52b7c8aca4b5c32b2d5e4a4f1303540accfa03d7cb8ee41ecd65776ad62f4dcac46b395c4e8139dc597c3db744e5dee5520a0d212ce477761c065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ccc6ea842f1d24bce5df4bba43ac9cb
SHA14e9f52d36c61b72267eb556a9975f02acc23bfb0
SHA25680e2047a6a06fa74b9bf896e4f516aa31cd0684bea57f8212e6b591656d5c3cf
SHA5121ba20c26f09972ff2a7acc765896424813e88ca0a46259bc1ce568e984aa2c9ed92a6089a01d8a66c32af54185dd73f90c717d935fee89225e8d20fb1e34b4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b72f45b2d28c940211ee86f69efc10a
SHA161da7611965fa1c7c8e7996bddf028042e6481d8
SHA256cc2fc6c63f438538b8a7db24dff67c19e6e4e62af1d56fd2c852034c1624b96d
SHA5125e9359d181445312b0a9096c5f13e0b1b1a5744a3be9ec0304f449e0bdfa87939b30e5a62b03d32e8723a043136aceab3c26ccd46c5680102946f71281b75b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b3fb407150f459c4153122a6e2f562d
SHA13853c70eacc0f15c188cf00bf96f9546a516f5cd
SHA256e5bb093440cd1eb9a08e6693e74a3a512d0f138aedcb72cd06b077cf0a722c90
SHA5124055833c9bd1f530bcaed0642c00dc505148b65bbb24f66d562ce03ae471125756c89cf1831f4a89cad46e93e00a3e127f8e41e64435c656f66ba97e5a4b2a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e7f491f6d98c70c1e564ca12e865169
SHA13ae2e9ab373e089a43389c2581f060a352844e06
SHA256e75df4a7f97bd6493d4cc681b9920566a86af5171dec24ba4a3d1fbcec7190f1
SHA51269260984cd881bb089479298fa48e90b4494042203e1e53db23811b24d368cbb5ff6ecd456050214a4e14e8af17e4f4923bb27a23b5102dcd49ee88302a90cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a02202e3ff5ef8d1c4976f362581ad9e
SHA1692ea0541780480eaeec7345b441c1fa63043b48
SHA25624799f539838c5b1818a8143f4333b9761e17a02440b2dcbfb0731f307f84881
SHA5123ece53dba8595fb44e88593a2601b10f7f6574e57afe3ed46e656d041f13a6a34b1475d16f6980c1312522a3dae483df5175ea8f82c630e88825c6fd64e10716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5642a3d71138b970932c806c787bc60f6
SHA16ad260764449bb5eee5bc382b89362b939eaec00
SHA256931a4e21f730273984ecae2c8499ca27cf56243a8cad80a3e2cff9ecfd0b35a3
SHA5127dbf7da6a0c222c4394c9c1596d16141dc575a6e25a1495a2fd8d5f273746f49ab48599f8c1d068689e45184d42847416d977746ac76162e11ebd4ddefb1c1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5592e9aaf5f8f2fc955ed7d7121ca0387
SHA1b272f0a5e9dd11a9179e071806faa68741d8bae4
SHA2560a4f5613a10dd1ff5778b87b8759dfe6553be15e2e6c564da50531bc9bcc28f9
SHA512eaa42e60d1125119fec29fdf5489fb33b3b6da6d98c64102960ee62d4d9c10f26bb500aba82db638d9a8702ec382e14c8222598f7531fb859bb7ec33f0fdbe2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d53808c88531aee053a8da2f68456763
SHA1922ffb1dbb415bfe53d0b2a6a7a38f9e0c4561d0
SHA256656afdec620e6ee95118511a2ca3e8a18b525c87df0225064195305a5d670e0f
SHA51269e2aff960c0c4d0c437bcae5ee034178446aa2680b143cee01c89e34eed76c2104ced01da5d462f4daa7ec22917ae7ffdaf17b9eaa68e89861a4acc387aa3bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a