Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html
-
Size
94KB
-
MD5
65906f28cf01f11289f9fbe2a1afbb51
-
SHA1
29639c7f2c6bf29453c2f530b2431cd9d6a0a285
-
SHA256
f374bf2c0cb7432a2de01acb0f91de1e73bd54587d151c2bf1771d1825b70e4c
-
SHA512
b9ca9780bb9bb4f57502e8f30124e587ba7fad4fc8cbbeff33f5e60e01170554018a8d7b07632ee25de69a081eb1432575da28980636cfdc86882a1876905ee3
-
SSDEEP
1536:WMLiNgFL6VS8jBZMnanWdPANBIp7LAfAyaFXZbhBdkrY8mgHC+qpEyW:WAiTyhBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD8C0F41-17DC-11EF-9591-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504072" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507f0884e9abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006251a69c0d83c443bc28200ecb2547b800000000020000000000106600000001000020000000d99eee5598deb2e91beb1f65a90b9878d3092101ff7cb1f00a576f8355968d18000000000e80000000020000200000001d7ec545b5bd6f65dd7665f9091fe8f6e39d752d49b55a2114616ab8f204f9122000000071793925be230565aa502291657838abc71a731997b2ffaf00a0606381e0074340000000fc274ee1ac9a34c94a449dd0bd769c45d64cd4a1f0536f27a7b27415900d34a1e761203b6cc1ea2a188f728e4152e3e5f568aca2e44a4ee38578fbcbca3c35ac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2968 iexplore.exe 2968 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2968 wrote to memory of 2528 2968 iexplore.exe IEXPLORE.EXE PID 2968 wrote to memory of 2528 2968 iexplore.exe IEXPLORE.EXE PID 2968 wrote to memory of 2528 2968 iexplore.exe IEXPLORE.EXE PID 2968 wrote to memory of 2528 2968 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2c926a77fab63cdc76d4e70f831e832
SHA1fac038775a261ee394407c384b92989310f0d9d8
SHA2563a4cd93973b40378c40fc67c6d2b7240d6c69f3da4dca6e09580ac7665602a15
SHA51296c6f968107de83ccd84bc4ccfe4f382ee43f306931ae440d5544235e1fad4dd126a36579b633836dce2730200faaf1849ccf9312129c5b0153e2f27775adf78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2708cfaf2864711f4dee7a63fba744
SHA143823291b90952de3cf446a6405e5409c4b5f848
SHA2561ffacfb683693d9d93465949e64a316c3f065457d4d65ea7f8e6ca157ba10a66
SHA5127c188c13316c1a5284e0aa3ce999131d7a350875146129cbba830916cdf9f781a0aeb5e4220fa51dd0b234b2bf3f6b01b6e233409e814851c4abcbe52b983d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56afa07046f29b300c13991db183ca808
SHA12ab484c241eff73edb2236b96881ee4f330126a8
SHA2567e787ada0cbcdae76d7e7be29aea1ec426727c2112eac1d1bde3bd32910236f3
SHA51253d4fe5311317c9fd14d551849dcc923e1560149b9f7b2739c992482fa02156abc5f67e60a753871c66c70ce642c46ba7d73deed806a5da68e5d1f95e1224820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8196731c2b76321ebdf1996c1813086
SHA1e3e1b3fef1a0db61a29b9240499a271e1e562725
SHA256185bb2601b6b53f4c4d98d548749bc842ad98fd090200208327e44e4857942ed
SHA512349c3076dba64c44aa56624c7f23d099c52c04d077c8af1ab7a7fb48bcf4eeae2a32b665511bad49fde2c6b9d1c58807cc8397e45b5c39d41f5d008afdd15f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5dfa4bc938bb3a6df1cf7eadb20f57
SHA1164b57f18cfcc9edf6f27826c96632135399430d
SHA256a91b5aa1cd5bd19a864089f201f2c8a1dee6ff89ef8536f3a0848400ed86cacf
SHA512260c9b038c3b23d013a55a162e442adc9254b6df62b590542ef3703fc51e37e13853261f494d919d5647b2d51efd43fd5916253b541d54a88caba6def63fcbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6f664c7bc2ce70eed1d7318630b212
SHA159a4ecfe6a048f16a5eb6d41709cd3a9e0106a26
SHA256fefbc973303f08609d4a63923c4a003d79c7fdf89f2d4ed4f080562693975acb
SHA5126b717e17f1a1f7cbdd91ffbfae5dda6ffb6e436ef7fc294270fdff6ec6fb8817d78810d6193d3e5f1076dd46989250c3a44eb68e4c4b20b4d6d66f1d0d2ee4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75a1b11b331926f9dd0f7a646de037b
SHA1a2b8739aee10fc03fa540c08fef47795176811a2
SHA256308541670458a7e85bb820f9c41884fedaae0969bdb571a8398293aa304562a8
SHA512c644e970401422ffc3499dedc9448da2fcc5c69c76faed4eb36ceb4b5987864d1fa4c44949b7569b63e2fe862af5aef476f405fae5d05d4c3f63d95dca895453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0d0423c50532ab716d91c41134bc1e
SHA1c782f051e3606e9ec65c1ab14cd251322a6f6d17
SHA256df0c20f9409eff4961f1a079a092e5404310b0723c6802bd7ee998fb91ae8b1d
SHA512ce1b0e0ddad22736c9bc62400127c260475e8f49330d04c012b9854238170f4492740393ef20f37e917f96d31efac5c2d91887aa778cbfee0fd12988f50e14db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db0115065c43dd21b71ecbe5dca051e
SHA173a0dde150f0b7dd67dd3bf2a147820aaa98a0a0
SHA256694df713845d8e83b127ab8ed1f37ac6331bcec56655cc165e0ab4c914443d93
SHA512a8ef6dbb0585a873d1f8636594ce1be3b52888e68e04a5d85b1c5d95a1de122010031dfabd1bbf5f810c5a6d5866f33236fbd3fae7271772c518449172a7dad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59339be48a347824ad91cfb05e24fcf68
SHA18971b81f67723776575ba66b2507a9ca7b767ac7
SHA256a2617171effb153ddd9393bb1c9c15e741c5943c4069e786683a5b02d729c5d3
SHA512e34e11ef66839d4e0c368c6297301932b26b08ca99f5c65a0fccdff6601c024d6bbf5ffce181674cb1268d87c45921debef743bcec2a287b3bc86ab9295eb592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599319502beb9b73b0eccde07dc08c824
SHA1a4845db9f4244246d5652cf05bc009dc51e47bc9
SHA2564190941d5cc33c85e1d153bcff61630ea4b63ffd9e615bdccb721852e57263d1
SHA5124267f9d14c8205639a2db671072875fe4f28589d16550293fc1314b3fc1ab6dfc7082242876524d02b0df15cae2efa804f1b2dbd195b0ed7144611895dec1d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9390af5f77e9d54f8ba24eb657892d3
SHA1ed53a50857734e6995f0012bc5a48daad7ae1353
SHA25638b47077ad1e41f2ff8cff2ad84d2ee9ebb841c6e55f340feb8e9d3ee8aaef27
SHA512136fa9af6ee747e73b9c0e812b337a7ccc7be65ee1fbec94eb8e9485a24fdf775621426d55de10ee6fe508aa76d44ac3cd4e1bd41589b09311f88279dfa931b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c964f0bfd0dc21e6e700b9fb75b21de6
SHA1608001e8e9ce130e933cd7828956836f52ecf996
SHA256ac281c4cbfcbccfb942405926a22ad0f4758206c3db5946b1a77ea67642cc431
SHA5127fe96222bbab2aa733460449ebf3bc53fa1ab51dbc842321225e2eee1046bbac8174efc4ca0b2c8b6ccc4626cd41b3774f5fcbfc99a1b94fd93ab507bed79d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb485510cdc0cf0100b1ed1dd774862e
SHA13c02b56b3d067297962f23ba7a173022d79c3288
SHA256d254f13d5579cf02c75e5e2295677777324b6d52c99501784ef20bd5f98d0e52
SHA512937bd426e34457a7227e3efd36f62e18c144223299d827970efbad5ba86698afe04dd3f7c17357d06e3cb8217ed288aeaa1453c0e515a2db4eec29ff5a27d47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2fcef1dce6b1c1eb4947fae4e432e5
SHA1abb578ad52b23b9e0051eaa6a2cf493df88bb559
SHA2567189ae462270c5423a15847a12d57e9c4932fd6cd66ac731ec0d4ae6be7d6957
SHA5123c309515b2a86f69a65919543e5f91e4c45c23096e7e557d3bc7fd540df0876fa2e0310f9b52a0c78c968adb9ec6c4dc9d451c16cedc119cf2705247fee3ed3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce07843f5b34239269504ce255414f31
SHA149742a3cdaf239087201fca9b045633083c4114f
SHA256dcd5928fd984a61337fa66e59d59dec36f899c66f76d041cc1485f63656b8371
SHA512604e1c338ccba09c74adf799bfaa10d8ade2d45ee6c70d4066e2b381ca57c628535d2c4da31ccebccbc5fea9c7aed10a86de0386f8d31fa989ef5776ac753b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525fb0ff8f58008db70823e7afc17dca0
SHA12bf148f08c3e5e447adc8418d0d345deaee70e1b
SHA25685907f59c47d7844cf4e4efa199765411cef6e3c5bd6788d52bca0f85f4662b1
SHA512cd0977ffe598ca9cd21edf2c50992e059cb0f3effea984cc59e7910701f3709c3b4997442fd11053f39325adff299f25d304f93494a790d236c346dd04a3f56d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8026010cc030ac275fcd023b5e3a6f8
SHA148adc5c11987d0e3c0c43df21dcb57b4eb9207ed
SHA2560732193682fa0ef2aff18758ac62b4a06d96bf1239c45461999ca429272278fe
SHA5121f52a113021e77beef47346a8391588b3dd09cc5423be2b42a3af2308bb50ab223f485619feb23eb0573ae24beb02724c2a9807d5fbab4cd313f987576fc37f3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\wpml-language-switcher[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a