Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
68775d53e0faf7dcc1fe352885e7a67a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68775d53e0faf7dcc1fe352885e7a67a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68775d53e0faf7dcc1fe352885e7a67a_JaffaCakes118.html
-
Size
19KB
-
MD5
68775d53e0faf7dcc1fe352885e7a67a
-
SHA1
66d092f14b5d5a8d61323c6d8d15db447156768c
-
SHA256
9c9d37e0e531c4515a7744c7911f3966714395a0caacb1cc511ff67b57bfa2fd
-
SHA512
2b2a7e76f55fabc0b57141b35b4eb589b1fd5756bd2f9dff039178b727a081d407c498827692771d439758d71aeb0b47b2add89fc97a74dc296b35f3ceb6e2a9
-
SSDEEP
384:WCq3sjWLyf40G3fgu+vi2tB05tN/THVckMNRdVZUy:Wm40G3Yu+a2tB05X/Zc1ZUy
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a3b09f9c6814277d5d7f195c26a8dd0f01efe894cf296f80e37cf49052e6c65a000000000e8000000002000020000000c8cdd5de44355ec9d49b4ba316517c505b658455bc696e04328b9cd312fa703220000000a005237dcf3ed6bae39e796bf3a796a7eb7111af91bd231fb16629e570b8e21440000000285e77afad5704dd92f8d4d0b02272ba145199b37a5dc3d14d6d0fd79ac4c4330d8897ce492b4384050d754609e1a844990b209800efe54ddecb7873e9bff1be iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{250E8C61-1877-11EF-A649-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70aec60884acda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2424 iexplore.exe 2424 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68775d53e0faf7dcc1fe352885e7a67a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2489c41a57718682ad25a29607fbd2
SHA11e8117bc0063dc7be99a2f792874311e69425e6d
SHA256858fe492532ca63e5562fc0512c34c5a1f219d86fe0dc323345dc6b2eab11f8c
SHA512b29ed10cc4bc9d6176f6a4cbe4c2f401ba04393399f8cce36feec09141dc20225dce65f01ad61a7c118377286690f9c6b463de6e0d677f6e0856ea02ee16dd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d66de4f3e2b06e15b2a11324b963342
SHA18bd2f814afe2030b3a69e52af173de59fc488543
SHA2565327e4c5380ad653f2b804f28348f9ff3f65a4d0d5e8cef72dcc0428218fc5c8
SHA512ba47d93fa494c652662e79af1d0dcdd0a3e7472ee6ab0a00c117e186a4f2a0106f0db94aae10cc440affeb60583fda9828769e982ba6a277d371034f8acf4034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53710dca86d68875c2f7169eb843fcf7d
SHA1fe3f034fdcef3394e62b3b7fe405c5d2752eda22
SHA25636ebdd094a13326dec2e4ecec7bec9e0ce2eb317f29fb8df6b5b05fb247beb4f
SHA5121a718c588cf0cf02d64e66df0ef7f8d8edc4234075667cdfff30e9af4e577a12a479f390c5ae9ae2008eedd75f17abcbcd0a89e82d326e98b91ad0aaf7c44552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674aa74017aaef806c0fa37b26775602
SHA1db961aa0e3521c7496b26e05b06313321591cdb4
SHA256c723ddce7aee9552ad17fb1f5761ef805f39696c88974282517750b6e6aeae34
SHA512e570feb55a8c2f0e5ee163549bd5ee5b4978d901c61271f5b996d5a3a4af3f5eb8c5506982b1d272894dfa9a7c8d77406b1e184d4cec6e3d2f995d3ce8b70bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec93e2bef7f50415b35ee548e92176d4
SHA1441d2d8d39922c879d5acde4a5f02fb12606c5fc
SHA256ed9482bd8155995347e8c4953f9f17a15fc08cac0b754a86558604c9ef9e4747
SHA512b940b3643f3b24a5371696fb3b1d2f4dcc46f5800ed304ae2f5793d77527df6c340688ea8c3a38e7c541e05f1db30b52581fe0d1811019ff4987150ebd4df506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a2f73521ea8d604f7d3a3c4a6543a3
SHA1a3d81447f16af79490eeef7be5ab38788b74e615
SHA256389698429ec9d1defa17454aac05ca7bd923ae290f002b4f171348042ff49039
SHA512e2e919a802ca6712d0a77574cbf2ee4a210c4cb742a84b95920944fd21e37bcd47b02636de11ef077a723a850c58bc606d63b73ee1a6ddcb9096d540ce4164a7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a