Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
65542ae0a9597aed01c5f1b1e64689ea_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65542ae0a9597aed01c5f1b1e64689ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65542ae0a9597aed01c5f1b1e64689ea_JaffaCakes118.html
-
Size
4KB
-
MD5
65542ae0a9597aed01c5f1b1e64689ea
-
SHA1
a52d88aeb1377d521b7e95ace0151f569add44bc
-
SHA256
1c286f5a7eb9e1385a7df8b2a4e32fe7578cd2fdf0d24c94cd29c204216563bc
-
SHA512
d4b630397dfecd477b7c0805ff964d642abb56715cbb38b288d2ca7b3af8989592308b28a3ceb100a7e3e8a3cd8a51d8cb009f75ff3ff2b8f948e81c0227f223
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRTdUWid:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607ae556deabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82533E81-17D1-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000384ea66f1a5467edbcfad54d0c03d56f97c68662364775b19fc8277e1dffd3f5000000000e80000000020000200000007fd27b5806dcf354b4a6954c8302b59f85b0bace1dbaec01998c12edbe6668d120000000481b50737bfc5d788f581d7370b710fcb82bcb651a0658957f23ba6d77ee418440000000874facb84e9d26e3f8db667f460bd2cbb74be3035c6f423bfd8cc08e70c52f71ae0759dc9d4ec06c062ae4af3a0f4ff2f49303d0d40f9a61c726122e17bd610f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422499275" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1860 iexplore.exe 1860 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1860 wrote to memory of 2548 1860 iexplore.exe IEXPLORE.EXE PID 1860 wrote to memory of 2548 1860 iexplore.exe IEXPLORE.EXE PID 1860 wrote to memory of 2548 1860 iexplore.exe IEXPLORE.EXE PID 1860 wrote to memory of 2548 1860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65542ae0a9597aed01c5f1b1e64689ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518ede0d7cdce0edcb8d1343b83e53d05
SHA1455403acecfe04f63d80a28e35c07a3115ddf61a
SHA2569e4743d8362511a62cfedbd9645815fd8c632fd74713353759ee0322a19af781
SHA5124c630af6c8ae5195acf12524f568982fc4d5c24ac24ddecc442611d76e9c12fa7603d203c3f580559044e17cb0977a15e13bb8cd673e108596ae19973084e979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dccd2b4658776450fa90fe7648594ee
SHA17841bedd25364f3cff2b7827b83ce6e72131aca0
SHA25645a7adaf8a4cef457c06f5a1687ee293692a11ee8496161a05373b2d861aca78
SHA51280274859956f62dea83d587d64f80140365d6ccaa77863dc98a9a8c7ad82ea44272d8a12d24ee1a0bf1d4cab4b32522209bab3ff081d7d8343713a73f81afd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509b13ba0edc1282329f311eacb129aa3
SHA1e83d3aade2dd22018d13126a4e5c2f7f68802d5d
SHA256d5b700edf4b4223b18cab89f754d88f584c083a3f1ea90dac3b6d6fa62fece07
SHA512a1f1ad1f26ba453aec6cfe93f0871881dffc4ed4a2bc913fbb6d653b60f807f5a9d5a1d9dd19bb476a5bb211f56a3f8e2a018ae63196241030d3c27b4efb93fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e58e000fece2371769dfb3ab02c77d
SHA1c1d1c56464f51df1168f7bdf19eeac65e5708968
SHA256bcae8a43a29c43d401642918fd8f6d9ff615d7ca92bd2ded1d396a283d4d4e50
SHA5125a2def7be9a94e93d162683daaff35c81250a31b64b3c53d1f8a9f205a3ab0fca2596ec21103c8f27c7e785330ae1dc32b52030f1f9d8f62d1e63746b1a2ae36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e0166bf1927b1756e42ac8c6455a61
SHA10b0585b8dab5eefb06593a206dd0e5503ce62e4a
SHA256b64e8be0b8c6540ad7de2f0a7652d9c0c94d3e4ff33f27f9767681a0214d6c1d
SHA5129a8fb29debe43a372cbb4c46dff32417d45db863a68c43880bcfb6be2072f6fdc9da6f19427efcbb9a82d6d3a0332f41ad687e86410fa0b5f96c0eefdc4d9512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166e6588b726d837dee47142bd9f9e04
SHA13711f58fb5b9187729a17c5ea954bae92b904e11
SHA25689cda79c8ac377325ac86a2669ef8184716cfaa927fd6c634f42260baf793f22
SHA51267db60f12a66f747e2160ae90d1f60bd3b5e45d2f8856847c962748cf748f2afb5ab09a7d81fc03e006639a108a8f98f63f97739136bbf2937a877d71f405cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588b5f83aeb2ec470e5c4eb0df59ce78a
SHA1110f9281448afcfe03c43347ec0517fa40a002d0
SHA256fc1fbf16848db67d9f1837eb40070628b730dfbb91c7c93f27a4fab36eb5f046
SHA5121e911c70850fdcfc4474c8944dbbf88a85f0ff9fdb7d9350b994a2bcfe00547b287f6ec46b2108d18f81db93393f22e1f063289a3687b50faf15f799cf0d2396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52223b18eb13cdfb2849ed4d0a2575124
SHA143a7fbf4b9a01c71470fe018753af0b990d55863
SHA256716d0af79e6eaab74fa6714a7cc4b01f97f5a7dca2c30cc961ec0d5583e09179
SHA5125999688b80f738489c49fbd9834eb75ea6a1208bf4e68e2747af9db877b23e6484938dd867f06cb53e03a97bd4aef578b666c2e014ee5501b6980ed1cea0d2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c71abeae9c3637f38c5355cc4940e3
SHA1f82f4fe2d73910985ea4cc516d0f2de5a4a85700
SHA2569e644af875d9bc9c2f1afda3be801ab5899f6e0d6404ebe64c70c8d9fa2a9d2c
SHA51205961aff8f4314360fcc9136136a4dd5e863400a939a435659b615e20eee328c34eeea095b1b12216d837f00788a3b6bbbd8ebc9aef0add457399465816f198a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2bbe1e85c906d4bf56888a2acfa0fcf
SHA15f8b3ff79132f7cda18517da60c513fd10444458
SHA2564ac0d01d36e73c894363e99c95bd3dd4aae895c4f533b5b3a31b2a40264652ba
SHA512675926b037b131b47c47fe070b41e8d04b6cd3f5991fc0242ae215e9b3174c2d86245f6fd6aa2e397053f12b46cdde269e21c23c3083a28fdbd12a22cb15a104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580d340ca1a69d90e31ab2cc51789e779
SHA11b47ffd365037a1fc9b4d456e378a7fd9506e489
SHA25614937116c08d5b68f1924d81f718e28e100507d397519a20035840dbfa297f24
SHA512447ae4a19cbd3415e7a521905554f646c972fde34eee479467db1a28ea98a211df0d3608212f42a0fb85971ec39352a1510d467070cb2977011c7964b3b87f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564fed248fcacedeba1a3151b8c7e0dab
SHA17c24622e49b9995c881f345f16f90f7f3b56477d
SHA256d0b716e0b4803fadd0fe1194bd6bef58b5a2cdd809e01329d5cf0bd009fac813
SHA512eb8bdf5881c70dfde954800db4fe446923d6c70fa5996fc0ce554390e0ee97899d18e695098eec66e7256bdf042c972bd5d6d2cee4cbe1905d88a0c8a93e59b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c606be80372c169214c73d20164701
SHA1c16f8b524a09dfb7a67a53194ba0c6f1101b6326
SHA256b59fc86f87f8f70e16e91eada292b249cb85e462909b332f6acab66473764fe3
SHA5127c8dbba1e275b81d18d80282458024a3182ab666788fa8be1ca7aa0af32bd1fe41c4294dae0328b84654cee824346356f8e18fdd512c1c7a7431333c74f903a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad4ef4ccc5da2545b91fd8de978eade
SHA146d6b7185d2c15fc75da7e2785af1ebbad42a891
SHA2568bba8ba53e68073951a114686476ebf728162e9dc899ab8bb16a9c053dd5660e
SHA5121c7220b23707e25e6566988d6be3418a3d4fa5f182b86c815ea4c5500a09de6a08618eb5d472c40aea13f1ea9fabf156a2e2ae1afefad6ad1b065a553ab62a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951219c8c2291c3e609015fd3cb74536
SHA149d9e9d2307fff7d18ac39db3fb1a16dab9cb337
SHA2560f5c25385bbee453843d3eddafbf6c070060c02f0686e8165c003ed66f59adc9
SHA512d585e96cc63e266f782b555914ec95ea2b51cb61f7758a5fe0762c2698d271edec1681cb161ebe91e47bda9cbb67154aa1a040879cd1a3b846a28d414940047a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a796dd17fc7dbefb28ecc9773c136b0d
SHA1169d79a13c507c61977b40078c78d64e83f9a2d0
SHA2567139864237e0c3f8f8bea329c26e38da41aa5797f4ef530b6f701ee07aceaa20
SHA512207c0471b4a83c0130021e0ab2179e7e9f51c01afa04a41ad7c935b0c16e29d23d1a287f824900ea1bd6100c2262ca9fa15ef1810eb570f94ed39ea3b5d3af38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c21a2ff819e7067bdb913dbaa06232
SHA12bb1619f404219fa5b2cfba99defc70293db9f06
SHA256378e64b334a499938d8fbf5a49a14f141315da553363ed913370287d46aab8b5
SHA5126814f6823b2aa9c54848e81b9290ce1afbd42f9caa34336e99b850f530c924fe10b6a4440c31177552f25465376ab67286b47ba9e17031b2094e2a14d8a949a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029ce12c93c9de85daedcefc7f8d4562
SHA1aa5f396d8117dcb5569f6533d0e917201af21b7b
SHA256975a89a7f8c3182bedaf80175d712b3f968d6b7a9f5cbf414e033548550714fc
SHA51271baf68c326e562d353d2b4876092b812dab6058c937531556ed9af6ec801361ce5562e4a1373fe61ff9983de571e227420cfc83df26284152b94e301fb93fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a60d87bc1bb8e5ff44d212053d989c3a
SHA1fcad64b841799938a21d4f99afd52db5436a2856
SHA256f4431af509f1fa0fde45716680a3f3af65cddebde76aa57738cc6b5ff05dcc2c
SHA51290f01e7f5da08ee590323df23728a76eb0686ff1ad8530d3ce8dc13c20af63aae717bb54902eab329ce19e29458fed9f0050667a3037be45c26b206f76faf03c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a