Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
65781085e5da44993a94968b68f087f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65781085e5da44993a94968b68f087f5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65781085e5da44993a94968b68f087f5_JaffaCakes118.html
-
Size
1KB
-
MD5
65781085e5da44993a94968b68f087f5
-
SHA1
3a2b4df2b0a1a5f684a67fdd2d0090ee108d7e90
-
SHA256
b0aeda70671320da4dd7277a94466dbe2e119fc4ad9d7661aa9cb6c34ac7e34a
-
SHA512
821960914b3d66e07fd00d163c66b289361e7b6fee7f0f6e3ee74d295b228e3d005beb60efd645abbd8df6cef41eff572be2ca17633ce9424817c638ca396037
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDAD20E1-17D7-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102d17d5e4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007d35370fc95eba21344133876c12e68d358aff0e9109860cdcc6c144b5d116f5000000000e800000000200002000000037224de20c44ce5d0e0f6b06190fca4cff0d5113a1473519029a259403eff49a2000000091a3ee3f097223b29574a9dbb8b7a39a7dc8001970d423b61347a2a3a4733fe44000000078f71a4774af8fa034e52954818e7010537adc8d5c73dff991b03df3d6743160cd646a71688566ea984d696af4f357a83edff1841f27c46e3bbc1d6a00210710 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2740 iexplore.exe 2740 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2740 wrote to memory of 2412 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 2412 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 2412 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 2412 2740 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65781085e5da44993a94968b68f087f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2204bd37cd350797c831a4aca122b48
SHA1edcb703ba13b49af6742f4571aa021c81f0c19ea
SHA256c47b787626b912819a0b39246ff9958908ab8a6295fbb0cc86787c30213db9d8
SHA5127056e977353cc520adcb337cf50b9e105b7daea082ee1d96b3cd15f2b60e4f52dce01b4affc77c407d94bc8f1bedd9e2f49e438f700b2383b3320c01307afcbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f96f25ec7b72fb11f9b2da2fd3412b61
SHA1bd22256b0364f8901a13030adf7a6db9ec6a4a74
SHA2563546641cc0e78237407ddd6e8742f4f62c7abd96d408f17941344d94db6b1efd
SHA512c145615ff99d632ad026b2ee51e66a87da2f8cffe5811126e7105a000aeef1a0e9e1342ba7d7d5e23e8075219e2f7876e16f667d554be66ab6e083961ef7ef6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e4e033a39ed858d3977418a390070d5
SHA1a84a34291a979f1a7461348f16f42f34713f7945
SHA256c314e091a66c6e71d9c1d4e82c2e2ae9ff8c91dedf4977459544230805ba8099
SHA512a717f2eed7577bc482e6e50f7bf233b9e61a396d18204a116a5bb7047d8b1a7fb76cf552a5655e7df478d4410a4dbc95812641cd6d5b37ae0991693030b54070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbb005ef7ac8b8945ccc3ca49769220
SHA1f781e601bf4844b62333172e70faca860e5af0fd
SHA2563c6d23fdb86c31304557d74bed7676b659d0c61451db645d735a5bf6837f673b
SHA51289c1dd5e9e45bd486ee52f8339578fa38f6613293ea0d8f97fc58bac344f2972b5e90d8a51dadd7e716f233efb629a1a26a6e6699b2c6aff3afe6ff91a003180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c69a25d02dcfe4e1d2718064861081a9
SHA1c23eddcc741faf913ef9a6d8b573032a27f6dc83
SHA2567b09845d5e6fea3b5b52c99083b1b172be57900be31e6d584d426f3d630380a8
SHA5125645c12cb219fab3d7fef582b197f675a658f9b588150003452c3a8d6ae63aebe451c6452558579b473d9fde20b997f3d6b5383b134721c4df88b0fb4bda804f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4107426666d6f2cf18a1db9ffd3244
SHA171fafe7ef7ed515008c643a554149a49f7ebc5dd
SHA25690d90b583bb8c43be27ef2d918b3c41ff9342bdc429510690c20c8f864ab2c7d
SHA512681a3b4d77c1361b1f0b96ed089523abb39edd8d880339e3f1d0e7ad25308139c42498bbc3a89c421285dd8145c9ba0533a31491afdc6fe8fed436f2ade4f09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b92864d8de754b360dd10e8f8ca4b3
SHA15defb7c93b3e169c3335b7acfb0e7673c931d848
SHA256ebdd8ffd4da708dc526827776d4b99d6c3a8f854519a403177d1d0b514797330
SHA512fcad520736dcf81481a5abf0589c43a6faa3e7789b23602abc5cff50f3f1d9aa77f02f27360a2eaccc477c560ca02bb1d25d91405655b6aee7d13ccbbb642aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5973740127bc2e2f1a15961473471794d
SHA13d98d46b40f78edc220bbdf3fa11b9b39e146b53
SHA256c53086cb23e5af2d49b7ebcbf2859cb02281fa7c6badfdb1e2cae4db3c92a322
SHA5124b7710fe282e180c286fc9c01f16fcf8b5caa20f251725f76da7f47605f8147ff46c504e7a429b1c05c107207828439a60f48a2e54576089dee9e8fcd216cff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0403a3539ca55da96643290d294cf27
SHA14d69d52838ccb6bfa33dee53d35ccc9d16110371
SHA25689eefc3a6f2288782f03fae7cd73a561d03c08acf76d248cf663313d300685fb
SHA5128f64b5081af9fa43d82594f83ac020786d8e68a72a3dfec9055de0909085e326713065afec90a81cdf11ad000be7e579ad652571b60b7a2ed0f73c845ab55fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579bdfad18f90703955bd99c7c3c130db
SHA1f78870f56df322489ef6dff67a653c1ca5db3cff
SHA256fe83d0f6db6a00acf3a4a9e518080a4f3759c63cab5d12b7fc43c4b028e5ca96
SHA512e610712f8ae0968fcc35ae87e77e65c53c8bfa451a16244c36bbe82bd487b655869b3a11c5fc0f325d5c8a14547df18bfe6e2c26a88a16e003e4dbe1e0639c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f0566e11466c498eb0e4c2061c71b0
SHA17a4c05e88ca670875820a91c760c25a42e3a7027
SHA256a85142ca3e8347b3bf7d3b92a97f04de45b2476a99d3e8cbee6e58eb7b61c23d
SHA512f0da09e017c855a4f1e06f3723b89ef571b3b3da63d9a392ba7f09d92d54c6eaf75c02cd278598632d0d78a905d01345504277ad14ecad895acc51d1e17fe07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5effb9c6cc879361cb093cb838c8f3f6c
SHA102ac2ec3a603be5ed2441f88787858aadb2f6c43
SHA256003764f5d456a6401ae7db099dfe18c7cafbba233051cd2e6198e4823caa194a
SHA512edf850383b6a096c80d99c16948f2a6c051ea528d2b61593578f2b360a26cd6df9a3169a25ba32eab78f1910d910d7e4a2d25591b0e46bf77f548b90d18d132e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e1f447e5c4c63ea92e05fcc15c8b78
SHA1ee55368091074e38e900a90cf1794cf6d6937c7b
SHA256cfdd78e7ecc01c752390eb61d332df0d74c9897b20a82474a5aba2a832632c2c
SHA512919f81462d6ad6a0bc411a33700b9849b2bd4de3a63b85624496c267fa17ff30546d557f040b383c55b34860358513645e8c1e5a5dc0c0941b045464d542befe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb635f6a572add5d0c415b7e082847de
SHA127788b63ec231888c23fe5dc6a382f59c3aea6ff
SHA2564ed167b188a9560811ebe19d48d49167121d5891c5aa165c7f22e376a70c32b7
SHA512eb02e526b7e98290109237c8e85787aec43ae7b2da8b1bd460b797951ea8924a4ea9167236d31be78cf637ac543a4af7fcb6bc8ca75188877580af287ebbe226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556f84349cbfa712c2685a56e541e5fe2
SHA1b90f6beee23576b5a0614e11e931a8c2d8c25a39
SHA256dd6f181745f86cb95b2ecc352763822a3ee6dd5b18c3f1fb338a4fd23b64862c
SHA5125e05d80b1e4b3238615cf5d8f80f68b4d020ea479ab7cee29151f96a6f7c317390658892c4e91a73ba1c1e4da7fe41460dc8776b0d5eb62474b5f0d3c203b8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525b967ca80bc4ec35059c71cea5f3180
SHA1e0a9ee6b54151d4ea2da71bc2ff97f534f2f0099
SHA256fe5904336992436618e9f662c9fb4d75f9d956bbf70497040d9460f77b4aad42
SHA512759bd3807154280fe043332d554f8780ad574b2973f4a60a1e58d98cf44cea98405b156f31cd98a9f87c3f4f40ccf7e3edfec70e5b799dba2e34b035189ee287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c16306eca755d7e105b67bcf54bc354
SHA10aebe5486926d5c97bff180a74ec481b31e9add7
SHA256aa08330b37a07fed5800491d98f3f5e3a92612b28f82517cba21a865c5ef22c9
SHA512f55ed45f0fe51ab17389a22931043b8aada8f04ddf6a761425008bce67d84187e2db1227b48d93fba17cd5f06b9e9e456cf9d069dc7a736cb2f68ecdc85696be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5460d02a868b2902b469aaec96098c800
SHA1202431426931eaa3149f6950b0cd23f589f5ca32
SHA256fbd4a9f9c7cb28ccf703b03f94d9734afd6a7de4c806ec29257e3ce97afb9585
SHA512b79bce5cb418e90749febdeea5daba9c3e715052028cc62857b6601088f8e1d6ca18c0e2bd377bdd90788d2e674716c38b9a2cccbf9ec07d2702f78b25af548f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9cab443937354d80cc50b24c0a10a3c
SHA15a72ec6c78e936af08d0712def7bbc5001467b2d
SHA25665e58d24429c373aa50b574b5661fd3eac2f25941e26d080e0d06b5ff56bd4c2
SHA512f9eac92dd06c0255793d9651560bf233277b550feeba8f8d36bb113d46ab50a0267ff4f4d24e0fc38095e789141b163145c37dfdf4021495dad5013729264f93
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a