Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
68895a15344a4545fb9912630b2aa4c4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68895a15344a4545fb9912630b2aa4c4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68895a15344a4545fb9912630b2aa4c4_JaffaCakes118.html
-
Size
25KB
-
MD5
68895a15344a4545fb9912630b2aa4c4
-
SHA1
43bf89e0c04b160ae4f1ca262ef6a758f9adf2df
-
SHA256
ef2391d0d9cb78ea9af24062396447c0561cb64ba5b9a91142a82ea7ee5900f4
-
SHA512
470495082a3ff3888974889e2a32f12c93099f22fff0b123907dbd38a6076b1a54963641f0ab0ab35a1d9e8d1cfbe608e38ba324bd9b2c2a1a124660b55df31a
-
SSDEEP
768:ody01X+q/yxbUCrLC6HBn4rvrdbyC60EWFeAKrQu/9UJDvm:ody01X+q/yNUcjHBn4rvrdbhEWFeAKr3
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B20AC631-187A-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000799bd66244389f47b96ec8dba5d1754e00000000020000000000106600000001000020000000c163bd349769f943040176b4021c7104eef4793456c47fff6222eec933606813000000000e8000000002000020000000f923a0dcc00ab12b4969d61967839bbc23b57e9978d6ddd7a168576f91d4274120000000162332d4f3b9f453a70ef4260cc48ef3246ffec79294361cdb40956ef5e28da94000000087d83e41b2591e5ff8033179b609e94e0c1dac03547e4a3b5d6f08ba7883c84a5217d1531d8fa7d0c3a4dcc1f41e91f62ee73d97067c5c3e84b0c9f1e556808b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e5248987acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422571945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1936 iexplore.exe 1936 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1936 wrote to memory of 2356 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 2356 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 2356 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 2356 1936 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68895a15344a4545fb9912630b2aa4c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD589d360abc9cdd180a74d51eb1c47fec5
SHA1574f1e70e02ad4c6862e859bfeb6fe5513361730
SHA256f05f4234f7080297c24c7c69489d8ec3de41ad1bdf17a47aab5cce429c20dcff
SHA5122c89ef66f2de721c9553ad45535172ef81361aa39301c811a353c9a00be56a14438868a97ac51493d09dde7d19ad43a95848fc74295d523f39d8ffe6d89fd8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586dbe08d2d5a007bdd1e48da45f67687
SHA1244303a63d398640b11237fac7bd795cd621f1b9
SHA2561a6f7b279cb28d9ab246ac85c2c33598a895b494b3be372b9edfaa1e21946e44
SHA512ef9498abfab0762f45b7617703d3707b736976a9d16325391607272fed8684380c514f01da91f3187ec41c3bf0b7c0f8ea7d38091d479e2551540909f481fe48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976c94fae9b111c8ce7bbbb1d32dae78
SHA1bfedc67e51920aafc775d78b2b59b28fbcc0abea
SHA25659f06fc5e96e33054e05c0afbcd91b486715c08a03588012d41873142ef777e2
SHA512a3b797c3df7bf2eadc1e15bd3f210c498799e09a26f467c8f768b1f113d84cf7ef3ea9450cd0bb5e6ce1ac9878d8153743ea19f0b11abf31b90f64d5db3a6ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3c537335e96394a007ca9dc7b66138
SHA19a3730a5db908374e2c0da39f708e08044562375
SHA256c0370d15882d4c8cc84b161dbec59df79154b2ccd73aa49f38095883789af25f
SHA512b3121144e5d8486933375881458b65fdb40bcf06d08f2058df2970f8275f38c505acc67e26734789e97f1ca24d06e661c56e45834d9cd0d1159740d55eaea612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d005bfb0149194873b841f5179d11c
SHA1a262f0595366467c89cf9b815504bff6fd3aa11b
SHA25602d670b6e9c134f011989d86143eb1c2d35d5f0473aae28b136727f24d4cce98
SHA5122f34cc34a0ea55f6256cbc1e07b382af91d71c41de2fac9446ac2789eb2c1e1d3c68ffc82b299c1bac15194395b55dc0fd183feb6fc9e2ef2467e19bee064192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52930c7c32d628ab2b9e515a932e39166
SHA13fbb3b337b117835e695e8ec6d712b9d99b45246
SHA256f50025fed08fd6ae0a14c71bee053cf14f108a92a5c3a9ad6be70aa8b95a8883
SHA512442c0ef9f1735918d7c6961779eaf25e0dc9de2f31281db18953b298bd11d09374b367d401a0724a0826cad6e04d69ee8b5866aed45b3aade5c9d5d5362648d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5372e62f354b92319ea3eb425776fa3f9
SHA132c00183e041cde8db411b03dab73c418de9ed19
SHA256fac62ae44e62689f349c81a5fa4b5bdc5bc94ec05f81cc1fb8e9ed315481d28d
SHA512b6a0815eec85a16daeed8cecd8e43699220754b99da1fbb2edc7b397bc19a49c9f7841b2bdde5e4683be1dff0913517e93cb8c3ac532da82a6736533d3d5edee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d32231c3cd6d922d58d908d22bd48837
SHA17071b6e71e41b5172c371d7289e0c71fbc3d0419
SHA2569e9033197d65ca1b78c08464178f62528aac044be4002d0b391d6bcee202de46
SHA512291b3c1db37a35f70d8e3da7ca0e4ab9a7a1f89c175f420bee0cbf571a38571807c4036fb3b6cb30b80137fcf86cd668986a8290f35ae490339ce568274b40ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5151ece10dda2b3fd091b8bdc07dfc0b3
SHA100d53f4a764458cdc151153a01752f38b513b70f
SHA25688f03cd4c992179320597defed6b297215292d63e8b6a9f734cdca654b94e192
SHA512ee6a2f8677978a861193097a183f9b25ded2d938d8732cb5a8cd478a628557a16f124ec5ff7032a18a4df39f504ee55a4bf6b391a9ee707100e6424f55d77f85
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\Hummer-Job-150x150[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\superfish[1].htm
Filesize124B
MD5d618a860d012c9ceb214dc5c1f728033
SHA1fbfdf1ab07118da4af69e22e7a8741b6604da103
SHA256ec3562ea40ce2824f3f7a83bd422e8e632c2d1acd71d0b300caa9d39ba36a682
SHA5123cac0ff1e929dc3cfd12a4a7eec8e3c7858a13e27436fd2bba6c403e16b1882ba202392209b8ef8bf0609049951f1ed900a7822455ca346bd412a8d4e96dc469
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\scripts[1].htm
Filesize122B
MD5c6336ed2273eed524130f2460e4374b8
SHA1e66e3a23e0e2f5c0c29ec161d003589c2cff253a
SHA2566e4d59108827373c22b1b5a4b8bd55d8dee2989799117e7177bc16c2a7379ee4
SHA512733ad1f5a6c349b403dc561fbd1d236d9766ffcafe9af50404dc4953eb023d467b7f660cab2fe3a299cbaaed3b533732c954512a9eeada1321b526f9b9c2a593
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\jquery.flexslider[1].htm
Filesize122B
MD500d64a82ba2d055e5facd3a30efac924
SHA1308e275068e3bec5effca608fe9df2008c979650
SHA256aaa3feed097fda6687c7c27860c24980f3ff105b6f326d10c98854145e9afa6b
SHA5121151e227086964ec19c11eb388ace411a56a6e1da96409b2bfdb5313fb5df75223add437a653decf3afdfbd2be2cde421c512f9de423ad74f2ebbaf81119d8fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a