Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
68935431bc271ecd5e7103a089572a3c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68935431bc271ecd5e7103a089572a3c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68935431bc271ecd5e7103a089572a3c_JaffaCakes118.html
-
Size
71KB
-
MD5
68935431bc271ecd5e7103a089572a3c
-
SHA1
d157d99606ca9317b3298984e1008968decb7e6a
-
SHA256
3f3cb67f6a4e925ac51de8914ef40d9f27aa433b2f4ed0b21810c649f27a1b14
-
SHA512
1455391f18196c1eb946d59ca56f2869ace480ca89ed1681a42f2e77fee7f9659df74ef3296804477b1d87729bf5a39f5a19e79ca7076fe3082608efff3d3474
-
SSDEEP
768:sBq+s4NwVDR0zmTV28ogzZ+oM9oPd2LDGxS5iA69H4Uo+CveTF0lxQlrIyYIGRrM:sxdzaggGC9b
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572691" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100a385a89acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f5b06cb90936f0468ddd3d49bd31d0010000000002000000000010660000000100002000000009b8d7b33839ff8c148632d0c6ebe8f5cd32193f4ac58c5975b132e8f3554353000000000e800000000200002000000000a1a37050307d762b289f0c2c4d13bd075e8acab6d3f73f9fb58f8ac962d0482000000076f500db6a0ca0ca66bc7c7e2dce85124f9855c0083f7daad2bb951db2e8f1a140000000a77aea67e3d1ef3f6eb48f87e0a222be86baaad8177c59d7dafd200cb465c8810df5b907ebe37575fca5575d536afd2100b1b58331d96913e3dfa498806f2941 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{719A6D61-187C-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2860 iexplore.exe 2860 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68935431bc271ecd5e7103a089572a3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a64b7096788cd5fcdcb3cf6273312d
SHA1aaf354d770c58f965d8818e563de9edd531131e5
SHA256dba732ff27a3edb715d7828950ab7782ff7368b228d17fa19c3ccb66d7105216
SHA512350ef65383dee6e466eb245526a3cf37617ce25088862f0c5f6c6f1a7a8d9036678e3e4e5830fca2fda890fba9339a740777d6799011dd95a01ef3783bdabced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4ee04d287e180a285c260b9f84cad26
SHA1c1b9ae0b1aec5101c4db6292aa3f142ae9192a8d
SHA25624c79ac2b6f00f6aa49276f166af9c6641b59bc49e27000b2d20880890c53e6e
SHA512f229f531f8c58f4a70e955c103bcc600755ef3ce1a8200c5433b8a068f4f7f73964310c5f621978ac9b97835d61fa69f20a23f2afd49fab93f1452978ff9977a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa0e171b6f21c2e4e2978dfd59de32db
SHA117949ccd94c5bdc4b84fda535b1c4053065e0e7b
SHA256ce940be17998c18d437c105ee5ba5bee4d32b288fbd7d27507839be8f0a0e83b
SHA5125cf2fbe0d75194ceb1822d4ea39e6cb8c6fcb4dc78931832c364377b59a747b9f8be5fba9a1b1187474557a8a275128be6cd4b14bdce79223d0934f2a729bcb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152268a6502547c196a691795637fea4
SHA1cb000b47ff20ed5d8ae00c13b0225d05df283038
SHA2560df45c3b005d6e7a42976ec58f40ca6b921cca219dbb8467cfd9ef02bdc09828
SHA512c72b08c775347b627197b99dbb3fa994ea74a1c3fcde7b78a3824b2df0416f108bce151b636ea265937837a8fa05a723d54f21806e7ac63afc3c27f797c79695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e43751103784fe0ae694a10dcf2ff7e
SHA16eb8fd72dd7969da6ba8263d46ad9bb7d9a9b888
SHA25695ebca5367791458ff56c6aa911a9f1d7d9dc5020fc100cdd5ebaa215372bd70
SHA5128722fc1379e1f95c8c1a2c294068fced06c859cddbae121e47d77a7ea538aeedfb4cc2de0767676b3790528b80190d998ad56d489bbe34fea97861995f40cfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae9a3c85f86333710c414e41ed5a9dca
SHA1313feff1626a25e127780d9cb226779f84e9aae5
SHA2568a000672cc0b11522396496aadfdcd596dd224ecaecbb06ff138768025c3c30a
SHA512753ce2a75bc0cd0b2f463533eaf8737a81ebb23beae50a1ed7576f5ce5e2baa6b9ed9199cd8e9389c8b5d9ade63ef8c94e5f34254d908972934d61f6103b83bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfee369cf5595854cbf655671126957a
SHA116caeaf03e02909462f4f4cd9e0b2d4ff888fbb1
SHA25650bc196f7a1b6079d0eaee7b1c93e72c9edf697687925a7ca0c612687ff3ec18
SHA512b1a3aa41faa64d527b04700a757bb845d12ef6a3a34a35cd6a4d08dd08c7563c2a094a7a705d410defe27195cd066ba0369ba142dd9d7a246570b6274e8cc4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d6d4ccad55ee46d7ded8cdf7504913
SHA1c13edfa06365f724a452b6bc6d3fa5be4d984d78
SHA25660512c492509e41dc23fd47c2844862515fd3973e297819e3c1137a8367ffdc5
SHA512e1fd2e3da204bd4170d870ab0cc6eec7d3a5592640f837ae195db9a6389f9ceec873e24e1afe3e7a0624ffed3c0b1a22d6acead68edb6530e86c8dfe97b3a299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd61708ec6ac243fcfd4d0f101b74501
SHA157a9074f97df7d750ac5c9f87af4fccb7aeef922
SHA256d073adfbf167d8a2cd41d75beb3fde9d034baf37bda6990185ee26e654a6c895
SHA512e4352e24e81035b2fe893ebe5243379609ab3adabde8374ea02d404cb036fbd39deca2aba91ddeaed797479c759de7cee1c5f5dae5f51c32f94248380dd125fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5614eadffcc63bdb94ce65706de9fe39a
SHA108f9f833f45b251a6dd3e42d5f2a42babd91a23a
SHA256afd169e131b5c668a2f150a2e457f99e8c1ea679dac7a989c741aa82ac9587db
SHA5124bdedd5a061b6009b85cbb819dff4512d853e8236a612bdece7172523a4664648853ddbd3642b16fc06b5065affbc5dc492bb2649c2e3ee9006bf246e2337e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c05c77f105e719f3edc9b5f8d126437
SHA1f856c739a27e1efb1e13e09d4331c455d16e70c4
SHA256b7dcf6b3d7579b6c88b6aabd5212fbd86df5facad1ed79d8a01f6c4483af7b77
SHA5124ede238ed0d38d1b1141b528010fabd8e9fe4896e7c370320dc5ce1415f42b7dacf5fed798eb9b106169da168809c563941308639b49d5d4f87843d3f6594c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1e41646a19f452792edaf8a1810bb1
SHA1556eb29ec54fe7505f86a872140fea25a7fb7238
SHA256bd4f94b4003a7ab30ff7af4e64fa4e2f5094ab0265af3b7175d61a6858247270
SHA512a8515951826c2f07ccf31ef016a0693e47eca8fb72d258a8d36276571cb8910e25293b0646a3adf8c9984ad374df13013e764578c5443c7e321509d01d60c477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e28a3f800065e814de2a867fced3509b
SHA1bdd4610e5007adbf97e36c196d72113622dc85d7
SHA256b0a7b5435e364b21e64af8927cb289c612ddec2f728dfe162840dc79af47a4e7
SHA512d445963bc1864c49d87c4bcd42e567f22753b225c736d93e43443a88e12cad043d31005c92a874587d40f8d2a3f05bb786615cb990f2c6b482792a3091794aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ae8c50f2817913f6cfbccecc739182
SHA156a79692adc73b667a11bd9d9b4eaad61a876867
SHA2563db3aa486b71699a960114d704257324c08165a558ce2764a88b19df319fc811
SHA512216b44e248daf1540a7813f39d9627c24cd16742cb109568d4e1cc4c2dba1e9dfa52f50d0ac57f287ccabcace8252070d55fb7f3ca82175a9af20d27edc72357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555648c0a4a17883abf4cc952daba27ab
SHA1e4b2b8ce896deb8338f6630e6909dd3db20b01da
SHA256db889b6eab4be65d0aedbaef4c13bb70887530a8f62824e74f3d4347958d2339
SHA5123d17c2a60f2ca2f9c6291e49810d253d92adaaaa5a220f67fadbe27e295864608f6bac3788d43642bc38b16a735cff85a03a3115d401c8ae6225cd3f7859b80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f2a91d64d9b69cf525bc9f350e1829
SHA113efed45ebe91546aa49d7307ede025e46b57f63
SHA25681c973b840007a60e87951f3dd85fa997c47fadfe721c16c89c34a4da0c03790
SHA512658603cecd5f0e53c7b3830eb2bc012954e78a1f0cb027634618f980876fef4969b568b70b8dd01dcf278153ced6489379081afe6765512d10ff36ecc66080cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ddf12e0064e3d120c335945d0466fa
SHA1491f7be4173a61a920e019be181690bfe7d59464
SHA25624fc6d1f8d639a74907b035ecdb5eb987fd67c97b34999dfc003ccd7b63fadd5
SHA512aca0cd498ce8d33505cc5c1c7d72381fb4c6fe42c3865efedc596723f86b2317e0e7944c6ffd0a2e67d31f8f747d872092b6a3b53664abc5fbf26b9ca93d5cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb7b2aca49f4ab583846082ee94eaa7b
SHA198e2a5fa37993d143b91d7774c927bcb440bd8e1
SHA25693fc337a0eecaaaa7d213f9f032650f1c78c748fe544e7b394a30c9af7f2eb6e
SHA512ab65010b62e87d66555378bfc834a9b3ce1177ba3976df582982abf83ceba86e781634a17c92ec2620fdb771c0afce08733774b630f77d4214f0598399e518a5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a