Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
65804baa039c063f9518bd28b122fdf5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65804baa039c063f9518bd28b122fdf5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65804baa039c063f9518bd28b122fdf5_JaffaCakes118.html
-
Size
4KB
-
MD5
65804baa039c063f9518bd28b122fdf5
-
SHA1
ddd1695e53e21fc3118cfc4495025e984714c595
-
SHA256
b1300e6bc4990bb48f9854abc0c437e0912b6d141aac0f309d1ab6f3ee7ca836
-
SHA512
bdbaba1dea659d2cdd3764f4ef34db5afbe51c269b491d5b8a109d0d992266e21cfaf75f7d4b864fcf2e6f86bb37c0e2b610eae4fbb9b1da8e5593154d9a726b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oYMzd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000087c174c1d6dcd04cafa76635b30489a800000000020000000000106600000001000020000000bc404c138cb1eb11df3ffe44dbf2aa716db1c719cfe4ad4f697a2625f29c1b85000000000e80000000020000200000005324ea28c02ac09259255735f7cc00ed0da3c3d61e93a955e5371bd5b62954b020000000ef2b154754a62365584fc28b2fa9b5450b34cf9266769ec3f288373a3c41b3804000000049828b082db20a804a5e07a1cbc1ec6aad98bf19229e2656970f1b219ea50fbd970700e502456dac882154a2436a670f4cca2b49d1464f819549b95fc0aaf792 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8052ba68e6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{943349D1-17D9-11EF-8DE7-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1628 iexplore.exe 1628 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1628 wrote to memory of 3016 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 3016 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 3016 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 3016 1628 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65804baa039c063f9518bd28b122fdf5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58585d4b5ff4a56bd8b9731c09899aad1
SHA11342211ab9dcfb47fa73acfbf25ca4d00fde4b54
SHA256f6ee13fc1a49ee367f58bceaed72729b24dda698b9d0527a82d1836058ab9b36
SHA51282375cb9ac06e67ee36a9ec34adfd2d797ee6fbd5dafed6c66283d59220cdb934946a5c27ca54c0cc83d321f8d8672b09d5a01cf115a9de2a5edea41a705bca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a0b6b481bff06ec0b1049dfa89205dd
SHA181ee239ac3f47b99aa9542f09676d89448031bd6
SHA2566e7b81d33a2ae53296e08598588577dec44c58c829868b0d7a3cf6a1317b0b4a
SHA512e9bab724f4121b1352d5240df23a0afd56dc7b9ca76868294ab3b695d60878c5c0c0e0eb2e88ebc674ccfc51b433a764718a3c245de5e7f2a5575650cd3cb18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520482f76e142d6f41fe3be48f19fa34e
SHA1e80a79688ac0ec07cb9891b7892dc71bb1537c7d
SHA2565a345f5b850130a6938c49c46cc2a5deacd0177cf51ab71120b2e82d2201fe8e
SHA512494de6dcdff0a4f2b9b6598c2670145f32a9da8e555b5a623ebf539075c61336ebead666d630aa3dada247d7d8f6478a7625c5486b7a8892f959efde957cec7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078052bbe86bae326c83370cb8a3e39f
SHA17adb4c2c293f37b73a2b0375ec80002c7f3eec7e
SHA256079bc5c4af0cc424973e18fb498114d929550521ca81343eb99149db5a8d5a59
SHA512ad16a4c4499d6c8e097cabcb100c9bea20e220e46fb14b7a130daf4c5fbadd4860c22fa1ec94ab9daef345995043801574d6b6dcfc28fd772f0633c3c46436df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b23ced1c953f1b8d602189301b224de8
SHA1e0059e598d190e4cf44f7a9f5f671a8f4124129a
SHA256257478fcef835c2ad585cb614a8574e5ee981edee21f626101f95386dea14770
SHA51264bb8772a583a54c3210cf9f22ab435f42916448d4d12fae63b99b400c1db6964b6de18a7efbf784b505b9027e137b621480d64fe45fca73ddccf143334e6e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5584e4a9c23050e54c0f828b8b7d6a4aa
SHA1f41dc4b3a91f55bb88fb799e74a8aaff14938de0
SHA256d8d67089c4e72b09db48592d2420c78aff1ce25aa298adac7f41139440fea962
SHA51227a5bfde2441cc22df4ed9dce4ec3baf70f32e1f7a421bf5d1709aebe72c6c4c5115553bcda5d9e7daaed717f64b08c5d7faedcca0bfd7c878c5677b95935fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a514d51bba7248052bcb74e6712b09c
SHA1b8113f2fa94fbaec6348abf4759bbc6078efa567
SHA2567c01d46e43ca3b59c3347d2054c56243ddb0128e706b64351d86368910c7b2f3
SHA512fd55435f37b966d5acfc4d9a7be07cfa4a94e97f84a59757ec37f545b5233fcb674d1b6351418839d2ef9a28c26bfd97ebf05d114f028ceda62c8172c806a589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fc53212000c7dbb8bbb0c3a9b78d1d2
SHA1fa6a27ffd64cfab1d52572a7e3899b45cdd8174b
SHA256b4cd4307b4221195150372f58418ed0c2c35683ce8d8137afeabdd96425378cf
SHA512297ab7da98b3cc17a195c7ebfc96262913ffd90e9174d81c6e0bd6138548f91cd7df7aeb72606068b7c6d1ee3d63591a159c50cc8edb17207a06af1084a8e610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509f516a9360494bff140ddca007b0e43
SHA1a69283762ebb8b9d59c4e2f2a0b5627e0ad26755
SHA2566355a6e79ca7de2868e4634297b3ea2356fb49f692a3c28c7705f5474376de5a
SHA51201bbbfcb88823cf9fec1d1d52113a5180df2cffb08c9fcd41c43d68c1b71d3f3ea70e0ad024d52150c6f68760b9f199b51f238a441632a10d2f90405306ab8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540cdfb9ca31f6f07a6b011ed404a5f58
SHA1982a2f41748bc5b8539c23783e07e11425a3d84e
SHA2563861236f8b0687e2f6e5df852eebcc2cd7f5c1577660e43d4411a6db1a8da9f7
SHA5126ef63ccc5b1b54a82990db4592fafee5f505f5002df2efc680a4aa652b3ce4ba13a409a1a5c93ce5c8a0cc077bc357f847ce1af4f9701ddbae2af87ac19f3a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c6731c603e6306a99e218c28a95616
SHA1c408f61310a26de738bce8f2cefe05516c24e783
SHA25632474a177e62d49bcbc27f3b11f1c98f306be1a580b3a4466f8e76a8087ae40a
SHA512d0eff04e4fe159324ff430ffc8fdf86936d6cb326a6ca88cf8e362fb8993a622596b4e876f75accf6366dfff9c8db7a60a6a2bd27c231c107962357e08ab3770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db378a9beb864d00a7444c53bbfa1e5
SHA158ec9565942792f2fb069b3568d82fd794a237ca
SHA25623385e97db2397e83d9fd28a2132a6b10f97ff958bf99f8aaa259233b0585c48
SHA512a96bc34c242fa1ec1e7ada2f9415583c7e276ace62c4811e7e030a5d9cf29fb5af06a1dd355b110e2ae90d02a53f4360eac8b2d381230d8e67ffd9f0b24260ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d788baff42a7221955caeb84537e0284
SHA1d8afff50e7d31c24425c0a910a7f0bbce6034e69
SHA256e9f45048245b07b2515a918c3ec16616d60c4bf7cd27c7ed1ab89c0f83845468
SHA512dfceb21b0daef974c17646804bcb530551966ba679ae4eceafd2d84ead379f83124e30123276c728ad15fcb0250b06ae5eab872096ce8e3b632ef818c504850e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40144a8da18e0c4c40e3bad4adc119d
SHA135efab17fde45a88dc2dd16453faafc449dadfe7
SHA256798656cea694a50ea455236a90d6121b6af66ad29b90148404ab09090da84f04
SHA512ce701db4a98d1d21847ecb917b14d3b06100b9f5c0f0ef73c899f19d03203977013d4eab1829074d5162074a3edb8fe32b629fb31d09cdb8cb4f0cbb4b877139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f217b103d6c9d2340059094c4165471a
SHA1ce013dccd69f17be46cb91fc8eaed1c10260f3cf
SHA2566575907433d25de07442bd843e3d429ae270e1351fdd0afb3229c9d3d4ce5893
SHA512f7000b0e44f1c836c4234d0859e0775bcb14bf14c8ea4bbe528f2ee71866960049f9726c435e0f9b6447f600b2ccd9bac234a6c4a1bb4826ad2484675c89ef94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d28401a69707c5055a69b9bbadbe96
SHA1b732dbd4c0c05b60dda0286e957fd437503ffe66
SHA2564c22bd8e3d18f8797ee3d1fb647dc81f6bf417d9262eab31a7ab668591a24816
SHA512317c1f18dafcae64667e6b9999520fac085b5ceef5b615538e725236e94d558b23848cc3c0c4ef90244022f99dc2496d9f8ece13da7f43ec3a3f6a0e1da9d281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e6aaee44236629344271276dcfc22d
SHA1d746ee780bbf70337458a3ce106c6fd526dd8242
SHA2565691832c7036250a3b79ef6c05ea2fb20fb7389810043bffc55481086a34cc87
SHA5129d62df7fcaa546dda0208092d95930ebc25d05b91e82fc762812c61652df986cc3ff910077130a7a8b75a9a02b3424a88df53bed6a6f3a7940c575e713e411d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f3740153385a8169c08390b33e6c39
SHA14241bf340975b5008814a2903e9f545707bbaf25
SHA256f9e2c44fea4d16052bfbf9ec011a23e40edcb6fcee36348f15fb35a85751f395
SHA512ba71c5d77e110be25d2652d9f69960fa7da2cd9d62719be64a965b857bce11594dc6ecfe4541b5ca4c182418a14c764c57bb0407248682964c615a862d26767a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a