Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
68aad557f1adea2f0108713b9d776786_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68aad557f1adea2f0108713b9d776786_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68aad557f1adea2f0108713b9d776786_JaffaCakes118.html
-
Size
70KB
-
MD5
68aad557f1adea2f0108713b9d776786
-
SHA1
7e4bb12a9c3f19f308c943a3226b8599c0280264
-
SHA256
feac2ca6f68590c72f8510e0f2ff83080f2d5205529823ec1f24ced0cde38258
-
SHA512
11d1a269bf7b08a74214e9e55a7fb33b821232f432a556a172ed00864dd283b9ac7c86dec2b36ebac60b7cdf2edf3c173a1a5ce987c534c88e908d04433a15f8
-
SSDEEP
768:UQ35YDrDY5h5WMaXRwlt8fTYw5tLb7YaJdw3dPOKLvQ:UsYDrDY5h5WMaXRwlt8fTYw7YSdw3dP8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b1ca51066ecdd4da57e98d1c813a18100000000020000000000106600000001000020000000c779e8e1c9a5d47f185be9c3e93063f69f99afc450eae5d3656096ad41103608000000000e80000000020000200000004c58b5a641e33f987bf249c0032cfac7d884bb16579f1111298cdfbde44e798f20000000efb33f0a2e836a3a1304bce980b7880472205d432bce622592a63b1994293205400000004da2011058bbe6434c2ac761cdffc2d626c365185d6663a877d34391a2d9a73f47a2a8f89418fb9e194109a4f8c51eb870d0686e5b31a923b960c83f40ebffb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504787b18dacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422574546" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3497B21-1880-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2972 iexplore.exe 2972 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2972 wrote to memory of 2508 2972 iexplore.exe IEXPLORE.EXE PID 2972 wrote to memory of 2508 2972 iexplore.exe IEXPLORE.EXE PID 2972 wrote to memory of 2508 2972 iexplore.exe IEXPLORE.EXE PID 2972 wrote to memory of 2508 2972 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68aad557f1adea2f0108713b9d776786_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55ddef2bbfd36605e7a754fc3a5bc3c57
SHA14a6cc8913ce7027af130d7d4a828baa70fd72750
SHA256a03f25f4e3fb8ab8035fed3358f8ebaf3ab206088da1dd3edca4b184521537dc
SHA512e6b0d10e3363ff951f76910524e5429cd5794a54c470a31f1ea064878ffe94c01fd9afd0bf542a0124b2ac750526ab809ecb88e051cc02dc16e12405029d1be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b965050bfb7daa2efcfd26dbe6682c10
SHA1c6c615aef4c32a2a8fa0659229eeb39b3f83d4f6
SHA2562ce4c445ba8f301b396c6f98b10d9ff7074334449524fc999cb3832ca46ed46d
SHA51234ad00c5b1048479d5f9368f305a0a26bff543708d72c29653b89e7a8b1d6f1261df2a7f55d2978077027629bff7b7bf391eda1145c9f7b638a35b59e7846c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f410b84a3bb90575b2b412cbcf7709
SHA1702a4549baa78934177c78d6717fa744f46b002c
SHA256f1b801c6bb751cc2136120a614f3f0df3ef5813ea5aa332ca31fbfc38b54ae62
SHA512aa0659e513d2631ae4db67f8e4ba4d03e57a6cc380af73b12c50e9a4e3139ec9c61df61ed5bb3e5ba9205b03e6775b68714252192bce589025969e111581acf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f01cf04cc5fda17192628526a115019d
SHA10006b734f4dd8fc59d78e2b8ffb93953fb00bdb6
SHA25633ef485aabc31732f91b2ad041f5770efc7c5dd7ee9bf6e8e2bbf44546e392d8
SHA512cb0c403b14dd55e1cb0e7f9f569b49fbe7354f868883a4ee31aa199dce533ddeaaf93a6c3f3b8590fafa150396639ef053ed8f57c057468960e31b1696a51de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b48562768f3d46b31d0c3a87483b00e
SHA196696dd55cd63cf4befecda1effc853196c2c6d6
SHA2568f9f2809c2be2919cd4307c956daebc10c1e0e16e76eb25b556205ce59603375
SHA51211123ac0d5d5da9a01e4f462f7aab8790d7a8067c8a642289de59a3f4ca0688c8e6664bc5e875ceb4462c95350bac0747a0fc58cd4b0f00335b2d6022bebc2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bb986cdbbbe4f3b9b3834b000dba1eb
SHA1de89022ec0203f3298db22fccc9e88aa71485d17
SHA2565d5fae96a22ad1cc4dbf312b36bbbfdd38ac1b1cfcf627085e0b7a43faa04017
SHA512728a96ab5ce3a6e28add088099ea2e116d4ed77366abf62b7e42c7df66c0b68ecd8edcc72bc8cfd7b29f3d0e21cd82325203476025dee26e8b0554487331350d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6a6a4f2ed66604a29078fb210063c32
SHA181edb25bf3c8e540140c07bfcee231629d4e307f
SHA25615e0c92482f46e412944a1668f757499b1e96c3189e0c0817119763fa81fc432
SHA512bad3d4b890c47b76505a41524b9affda094f8525811f53b67f855dec1cda16b166e3d7e9c7764fe039b02fc7bf1b7be6fb818c34f55de6541eb36d4ded1ad786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deba78b182f7cd16cc4403be153e1f76
SHA17c93792b1e14eb264fddafdf8c3490f173a9bf81
SHA256ef62e0981df8ceb2e45db470dd73e09ab00016bb91bca4b5046bcbab3960a4e9
SHA512be4b40e7022530f0c8d783d713b8cac40f7ab388793c8b89f7dc3487d4ac56a0a9f37a7f7d9c671669dedbae60d91232d7252a3f8874bb25039cf3547740e494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e1ce310d60315e8e69d2f052737d40f
SHA18e615062533420ae2e4fa915550b5d6353f32fdb
SHA256ea55e0f0bb0628c4453cfabfe7a36b5abbcc306742d8c52c8f0d003a66a61b77
SHA512763c59419f655e90df953debea36d253cdcae471e9b173968fa9852f4815ceece83f3d637583716cef617a6d11e47e8e5646a88dadbddf24eaca56070eab8cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb1061bb193d64742d4198f2188c938
SHA1ae51e45a0185fae43fbe1abb30e1c1986d7b85f4
SHA2561e52c9c08e5df63148f7fc47018f9c836a3dc3d187e6358dba994e09f31dbcb9
SHA51248c8a5432bc6d668084c85ff734a34ed868f5ae68c29c1484d1e66df40345c0c307fdd4a44bebd220f62eed94c2e97fd1ac7fcd95f45bfe9821d5aff2f696b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57afe47e341ab7e0b8d10766ad81fd4a2
SHA1f9686e551460f95982af0a690d7722fa6484eb38
SHA256b587e94d7f898427f745e2ec2aa88194b8416f8adeafa1493c6d86302d7a7f66
SHA512e9cc6da1f5c9cbf5c6ae5c7afac6501435eb8dadc55c9070fc7164c6d2d7553c7a3fccb943bc5dbd30c03d6f6be9adf554c004b69efcd6add415b447e0099b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ba0ba31f90bda5d9aa14f37ff33972
SHA1c78b113652c1cb33e616fbc9fe5d8c7bef35a934
SHA256df0d53629868eebb31a20bdd8ab19778a9d8470f3ed06a0704351836e82c746c
SHA51295fbf45f5e36ee9ba47506971f1693f4ee2d961538ac0b9bdf3e6612f18e0ee2ca36b67c16dc667960b691b0996ef80be4bc4a45ec3a75784370166d756d21d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55bf570ca55143afe6af08522327bd723
SHA1ba937c6d1423d4afe52f29ae26b6bd2885c77b79
SHA25677aad0106edc1a3718ba7b769ce762e1cf72de46df2da678234e4634d9400769
SHA512d8021f1684219a63e0926dc5e406e202b5b5717dbd980dc07b9d369411140f8a880567effb1aca1e2cf81dd8505c1e85846c83c688cf2c1343e06c141464c7a8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a