Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
68a6a0de664340bfaa41efe856e5a449_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68a6a0de664340bfaa41efe856e5a449_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68a6a0de664340bfaa41efe856e5a449_JaffaCakes118.html
-
Size
9KB
-
MD5
68a6a0de664340bfaa41efe856e5a449
-
SHA1
242ee385a5d53c00b9cf3c6c9f46c2f5639074e8
-
SHA256
0877bae01d5e5272dfc12603f6739c1f5b281d957c297c31ee9559da17ad4127
-
SHA512
51797faf49a05041e19d14f36aef1b1260b0cf015076ba57ebe98e36a98508bb713982addb555398d09e91177cb9d382a2e667d119713bddc8cc8539c5fef4f1
-
SSDEEP
192:ChJITEu6u16XxweaF66f/AqdHFs2hC1Jb9szavTALxWzfkoN:ChJITEu111P/1RFQ1Z9sSTbb
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006633a477551b3b42a6b207f22cc173290000000002000000000010660000000100002000000027497ff1afd22fb1dcd7318e0b2da67462abfd4161335f0c457dc3efb2427a29000000000e8000000002000020000000986eea685f19e55c8d072e4f6e0bb274c43e8faae6f987ce21f5436448da60a22000000056d0655d1a5833fe7db5a3fe518ef640d15a192084b99ac008119eb58589874740000000f17d16470ca74d02ce177b5ed4bba8d1a2fde25156019a2a5b65bdcb8055a1d03708bc1f0dbd6771be6997c60d985e51efe0db2aecb9c8a3ec509616a088fa8a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b1a1a48cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D013A3E1-187F-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422574138" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1848 iexplore.exe 1848 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1848 wrote to memory of 2080 1848 iexplore.exe IEXPLORE.EXE PID 1848 wrote to memory of 2080 1848 iexplore.exe IEXPLORE.EXE PID 1848 wrote to memory of 2080 1848 iexplore.exe IEXPLORE.EXE PID 1848 wrote to memory of 2080 1848 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68a6a0de664340bfaa41efe856e5a449_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e95bae9b5f7f42aefd45413c191b02
SHA1fd43c79043cde25649334284a1c47ab02a39668c
SHA2566a7066b016d2fc7c0a94f595c91827ab2f53b257a507fc907129bfaec3cd4e36
SHA5124bdd01ca89c640a30fb02601f510b3d23f2b57dbf38dfd334762b1e07e3e43100fb9c260a4f20083e8526d179e759096afe384f4190efd7c5e4a2edea2b168e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa565dc26c7faa280c3483ca0206155
SHA1795e9daa9d2cf6fdf900511a1cb506137ef4c059
SHA2563fd851527ebd66aa05fc111b4cbc0d7032e965e7a175a1b2783b7434029ab542
SHA5125c232887ff8da65a653af6f1485fe4c01f601b7bf6a839dab63029d1b9290a4a35ffbfe409795ac3e8835ab872bbbee1ac248bbd84e12af4eaa2e9723173368e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d385fbd4ee02aedfa81390290dcedba2
SHA1ace8660c7f20bf18eded917db9e940f264605e77
SHA256e33678ac161c973a3866304f96a664dee6cb0041c538d97c4af80c77e229b83d
SHA5126b64bc031a2be309db9146298bb2c27003df6334aa4c3af90498b14e99a44d707d6ca865915dfa80e97971f2e4098abf26c99253e645da97a9df626c0af33dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e7ddaf38182e57148b05b774e3aae9
SHA1cf145a142e9a01e0f5d928f817ba76bbcdcd716c
SHA256edc1513a348cb1031598ab59431dc7e1c863cd66d0f4c22b9e641ea0cc1af05a
SHA51274b2687f7f01280cf83fa207b2ce5e6a45aa3ca9bdca22625fc57957d472642710da2c08ce38995f877b5e3a24606e218cfba723f123b8a1beea89a009d0fe2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac49682496a382addae10d43c899c93
SHA1ac4ebb2af0d5d0ea98c17ce5ea30151ec2223a14
SHA256f35929d329a558e6acd1e17aed12403a46b5dfffdaadb485f4d1734352c7cd6c
SHA5123b15110564f2f9b02f290c5c5fb95788915aab4eb54ae7c44ecfe000e03f092bc57611b5772b87fab44a03e344da8d6e83637c999f710f1a861845cd428088a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582be33802ce784d14e20465f647d647a
SHA1ba63cca5e641e5479579f2359ac81ad40b6bbd56
SHA2569465c8092681cb12ec4c54b9e3cccbc3ca9c5927946b2c3b1d59251530c54646
SHA512cfc2937cf0f923d882a1b75ad8e9c99bc9e7bca1c5a997f739557465c500d69a94c4d465b15178ee0f6ef44c08c2ec9cb7333746ea86763491a709152f9d8f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b83534604d8c19d00b84781c71680e
SHA1c503d8ddf1a466faeeb0ad85632adfa4c34d1a47
SHA2568cd0eb146fa4b070311074b1520de857df1a6fb718f769b6f7603e0c55ee4326
SHA512e6ff1615b4df303518f9b14491684163070eaecfdd50596deeaa512ee8f555c3f1e0694e2cf55e28786889842d807aea9814b345fe68da7510f9e1b555f780c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887ed25935aaa163bf1324f16da887d8
SHA10292bf4f23feed2a08863c21d6ec045945fce126
SHA256983109d359cacb0e1940644869dad850dc30361558dc985afd48ae486c79ffb7
SHA512397931e0a6a3b05aacaa3f46048b85eb15ac9f8f1ba4d2e742e120091838bdc58b675a3e58de0138095bbd04b9a87ec82fafaf77e05680fd76bd4bba3e411841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f532bc2bb2c23f0bea3660ab24097484
SHA17aaad4ac1be3fa0fd85fec660e4d980c6c8f17ab
SHA256f88bd192ee2f66c4eb2cd722d1ada200e7cbafb458ba6a91baaaca9fa27686eb
SHA51211275546e8de84b9fe9d4db1325437f88f0a05b7536782b56f848e12cefa7000ecf0382c6b8c8a5a3d59514d540920164b7704785e9178ec997f5cd7eed0f365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fd4c670907cb51c10bf42f5dd444136
SHA1507d02aafe55204d1826550320f039a5f48a9d9a
SHA256c8c98f7afc9002f809b8f0124fac7cc5fa300f41750b29aef218d9c839292fbe
SHA512a04db6cd6312370a88695131213b67b438b69dccdbd688fdeded8136c8a5eafc1d15d0f3150903e19b121a71bffe87882c6b40b7d8c7e4c238c5d438d5a4cbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcdd98f3e452b34c1c396eaf3111a919
SHA1bed32d31310d1b863070ccc1df791e2a6d3b98b2
SHA256a1cb95942e3bd5abcbf951dbc0608ad82f58a45edb7e9a0923f37ede484fc5b1
SHA51264a8b68739aa8a488993bac664e2b404cfea327f8645195660cea3f21c0f6c71b2a3d69921734e372c4d87a87e409cf12a1787e29d06886ac3c38474081c0e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8faa44327d90a9633b55d84a12198d2
SHA10c402dc7781bf26ec3be2155468cfc1704c108d8
SHA2565253be26e1a92df70d2366cbb239a9c1bb97665655efd664ea6fbb8b3b047c6f
SHA5121d268950eab94c01ce356c419611f41c50cbe002d7cdd39b43b8d218211d0221f77b0ba2aa995c28b5305025ca65828d50fab59c9569bcd2cfb74dd99eb333bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592419424615d55857fc833ec60dee04c
SHA118b53f0b4cac704d7f62bc6d818404e6d9871b76
SHA2563f520949ca990d55cf36a28dd05cbae8593b28951089391ce4b6bf219660e9b7
SHA512cb0f002d07cd938b9071569b8d1119e0d6103dcd818e0dd02bb928d07702e996390546de8154e9e2d6a7895340104636d4f0c5f4ecdd191546979e617726fc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201488e6ed483227ef0fd5a0092a3478
SHA1cea4707a59b38feb30c5c9a8e8404b1c11d35b17
SHA2560eb952637a11293b743c1cc0c979b1988304aa9ed239a951736f892abddf60e0
SHA512a78854962bea6d0638e9b02ec9874923b3575600d79ee592be7c811f52fd8af66fd3a9c55edadc588371ba09ea27675c0435106bb07c5346081888635e45ba53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56390f0e205723939f9a7c41ba6cbfe86
SHA191a59d308e72e029f272dc6835a731f7f2e49c4c
SHA256b171c0c77ef83f7c935d69f86e0491b53f78716507674c9cbb9975da128f6abf
SHA512c11f135d7c0afd82bdf7ba1dda025cb61a06414bd53bc1af7191aa24101b6556268b2b15e78de53a2b9da2824234e486671261ecfb828a0b378fa681b77fce51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5573891c6360882dece075c5dc93963cd
SHA1a49f6314e0a661fad1f279b650e8332a1edf386d
SHA2565efe6be7dca843191f6b233a8276acdc76d957a66c3a38733ec9f337f430369d
SHA51246db73d80bebf4f2723271de4299deab039de28a4903a266daef0e010c0241cd886cabd175e6214d57dcba6b45bf4d0d68d99048570b3364fc7cc1c20d5dfffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c252f2e871e2d13e98ac98cf08990cc0
SHA1012b467056f85027525b216756ff41f2a9c754fb
SHA2562a70b655cd1043ac0be60ae6db86bda3764b9fc497e3aaf21b75e7667fc2f342
SHA512bf817fa1d50f9b0a5019db2be550528566d4942d652b1d83250926a58b6f3bf531cbc3ba52505d68aa05b30f72ec7f9007fff011fa56b4b6b34d781ae81702ed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a