Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
65818a1b70133209201a5216eeadfd58_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65818a1b70133209201a5216eeadfd58_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65818a1b70133209201a5216eeadfd58_JaffaCakes118.html
-
Size
461KB
-
MD5
65818a1b70133209201a5216eeadfd58
-
SHA1
7d4c9308ee80a31506518d5a1b348ff65bb60640
-
SHA256
ffe8398b3c384a3a7501bf7d94fb31c67305feca2140a52490feec55ecfc2790
-
SHA512
998fcd74c9d04b60720c9be669186900693d5a4a6fd46feb0d12ca237f5edb65f9283070e1764ce44654ec2923e44f02f5dae97ee222aa8d73945765de3022f9
-
SSDEEP
6144:SLsMYod+X3oI+YrBsMYod+X3oI+YdsMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3H5d+X3j5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50464498e6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFB4E461-17D9-11EF-A6AA-4E798A8644E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502814" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000044845ca5baf96146809c024a504be4110000000002000000000010660000000100002000000071decb343b6a9ebcb34c2996ac0f183aed189546e0222d2e45c15815f6541bdf000000000e80000000020000200000005d5a86d69534afb731e897b1895afdf5a12b10eedcb11b7e71b78a1b7dae73dd2000000084927955cc9b4714b62600d51b215beca26f00e5762a92264dc00ee59b7fdf97400000001581fa44046b3516995ea47113a2823f41042448057c5b4589774c32ff99314ab6cb35d0058a038fda38e93c1d4f562e531ee538d3a110b5e1c0fd20560681d4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 844 iexplore.exe 844 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 844 wrote to memory of 1828 844 iexplore.exe IEXPLORE.EXE PID 844 wrote to memory of 1828 844 iexplore.exe IEXPLORE.EXE PID 844 wrote to memory of 1828 844 iexplore.exe IEXPLORE.EXE PID 844 wrote to memory of 1828 844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65818a1b70133209201a5216eeadfd58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc0ac1e619e8ac5ae11197954d56315
SHA11a78ec6d9e05d096a975522bcc2f0d52c31102c6
SHA2561a4ee4454b263c08e57da6c010b6e955d84506d743e2808a367c3e617bdf8c20
SHA5121d1ee29b5da7e0dc590717166f06970d310d6686667b64d17fe1eba6a8bc2295b524f9ac2cdec437cbae36057eb741e34dcd0e5a584aae593b1dc9e698b7df5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9866f72da466c37bb0d7bbd16072d5f
SHA162ea7cc88983a0e74d4fbd34aea03e3f712ceb38
SHA256d251258efd74280d81b76a9fdab5c0c32a6cf17ac34de83b0d788b2cf61452c0
SHA512a12b4275d4442bd33f068e7278b52d41338072f0e7e514fce327bd4e2663b2abaef72e4f9b406588d920441e5f8ed42b1eedb3b0675976bfacdb258e05efec3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f5ba9451eba46f134774a75a1e279d5
SHA1f5dd69057ad73551a9d3de968b9b88789cdaa414
SHA2566f312a8a3b259b0af7c55a361c7d4ab2b67aafadc0b2193d01f433afd8bd5741
SHA512fadac81d778763a78637cdf2dfe6139f93526fb77acd2237a99260e8000dc07158d0d2ce3f8a49bf9d57b6c7c3285817be3cf5ef7e470645337dec608a63d1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5901a183b924758d017b099fe311c7ade
SHA1691fec6b74122282cb2b3301af65c78338dd896e
SHA25667b8a4291dfe79a225bc85a750cc8594166b36201c607c32dc7d5a5bb03b8c9a
SHA512450666686321ddbb57b4d3c76e657230217eafff8d0a2c0441aa0a89b9d4ff319e9522f1b6e59f490e83a9d5c108a74613448021cc0a8aaabac72652e66b0301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec0c0443f0ef548a63f9b140ae1655f7
SHA1eaa1bfbe9a2a89f3328512556bcdd603980a75ed
SHA256fc88607844c99a6654119f0f5d89e1d2982b3a0bba07edcd14bedf74a31ba88d
SHA5120820acc7c14d25daa49af9dd195344cc762dc5723ec891d863d42957ce95e9a906f29b550d7c63633fa73efc735472214a17494d720be9263c868a07c8ab5661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56183b47c4962db511ced1b8ad1260056
SHA1966005be991b5b50f7a8da3e92bab05cd81c1ce8
SHA256b2beea3cef0f84325a629313af5cc01edd5083280552836d81109505d4756227
SHA512b0dc6a83047d8f3f762555c7d4857b8a56d1eda8abf9356b1e53815aa60de54f9da4fcc45f4560b64b41408f4f3b229e5c04fa07564b8f1ddfaeb98fad30bb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d64eb176967cfc9e09ea4855fc4f0b4
SHA17f87cc054cdbda0594bca521a346bfd5f616cb62
SHA2566ce62ecc2de41b5c2c84f3d57f99e9001cd116fb9bbc2da0da50210582a5f726
SHA512a2fc98762fc153fbab71e7b66af393576364db8dc865b7cffbff4a8750ede05dcbeeded2d6792b76cb692b987cc3109464d49ea0e040c623430203cae1db6ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d8189a2e0ef9afbb96be46cb83200e3
SHA19efb01bae8e10d64be79399fc114ff12418e50ba
SHA256174f1869f00efdc4f7bfc535870f7e8d25d34832028d1ddd983e638828a7c33b
SHA512d573a0f9c2d491c90ba0deca9799131a00471ed980ca4d1d5482eb02819fb1f4ef0e3cdfc2edf934fb729aa19bffc57cda8e1bd8017b8135b55131ff5c07fe4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584ab2345aef6189665b84ba8f8731e45
SHA1f82028a91a1e9c290b8a4153ec66c24a2aed4a57
SHA2568dd5aac3d7caa870c4864d83c2c524c762bc5ca1a9b0e674736250a9e8fc5002
SHA5121bfc3cbdcc843d7b3b8932f6cccd02c0b138a102ff34c87d95d5aaaa92303bccca86548958b666c0a791c07b6e053ebb7412c8d9e0a69d0e26c4fb6786193b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f432001def587d53f618237515d4e73
SHA1bc493742593de0ec4c63781bb8408e9a4dd6d2b3
SHA2562713527c159a2810b44eb55ae7580e5e88666d82a237b7e1fced96086efd7a3e
SHA512784fc15080647ebc702ab4045d28ea237f0ddd0d752ee75676df596e4dea4d0ab6a3dcf8d133d88aaf9c334c3b7883a0e50749b7b0dd6d2e55413d1748cb9048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dabb0ace886b06176effa83bbcec6bc
SHA1aa90ba8965e59c3d7b0795d646f621225053ed62
SHA2566fd7eff5c415be00592effb2e07a4f48e21e4903d3d571e4d8addee3bee6e84f
SHA512f35ac5f6c6d566ed1852c1df540d15bdc1f56714495d52b7089782829485e43b4e4ad222c7728f72b4a806cff176fb3861abed3b9cf94e5d6ef5f0867f03ded7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7b08023674bffd5d2c1df116d28d10
SHA1451ad947a995aa7a7c8d62b7c5c49cfc83ed6cca
SHA256f9125357b34b64940dc842c866c1bf12a057fbc3413179b4d8cfd4d8ea781348
SHA5125ccec191987fa44fb9ef79fa78dd11b3527123d0b1eadb63110e01c55b6b1a1e45fdf4fa4270388f85bbb61edee1b060b20d157fb1b404f1351bf8c20bb1f6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fe4c00d1894cf564904ace7ae27c85c
SHA1175442137c7aee69248a01ca4ee58d65c6608383
SHA25644be93b632fa0c059a8797b91bdbf3d125920f3f9ad08babab744bc2d4dc210e
SHA512d5bc08df7950a4a0b60c43e1bf99238c8539e7424f387902cf7a958ec21e237ca73292b1df1a9a7af062d3824fd178a262862d5c0218b35a9212444136e035a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695bb437b432f068fec426f62aa3f754
SHA1ca12855a907d37c925167a296798b3d409ae08fa
SHA256229d0e22773990c9d8e3ae7af240bd21a7fdb4ee47a209bf869356761a3052b7
SHA512d4c58c226d5efeb20399cdc57a791979d3cffeb118139dedf5a8593ddf14fa063ef00787e47a1e37c940039758d1fbc3c490e2932146095b37fa9694958d7950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587f2e5200d4240fa65b7638f2bb1f59f
SHA1d94f14dae83d98893e95954d73fcbb2bde1bb1b1
SHA2563eb2db3e8fc1e823b5c4b69a7119891ffae90e01243fd7d4e6cd0ac98d277523
SHA51279428e5773b0c80821322c375791bc60006a48b036b0c9d96c41f03c828883d53ab733f7e17bdd7bf83960b9a886099b2f14f2d9220e8cd16c9eb6c01b7b8d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6b9e0b5800a7fdd4a4c9e681d8d8c8
SHA16b7f8b30e4489afd7a2a72146a5bba30af938c78
SHA2560fa16ad948a964bb16292cae5a62c64d9df2da4c875a4fbdae84548e52917e38
SHA51282ca39ac0762e2dfca7471579bc8b6c6c404c045f32733a0a1b0ec24d9d4292ba5739f7b4626669d337bd91322a33b3caff34c6f57b2c55c88f5f669de028e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b53b4dc23703f5b0add0dd15a670a9a
SHA1d3074c480b36d911cf04cdefa064e0ff5477900a
SHA256b2f2cf523c1eaaa033043bc6b1a0bab917d8008ad9878f510d3145a18c170ef5
SHA512deac8a4b091f10ce53b789a80b88edaa4fa23af66c2963b3ba6c6ecf022866adc8b11580f818c14b71d59feb93ff3a45d41cf94301754cab80f9a2699598a4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffbeffdf57118b1ce7ed76f931567cac
SHA1cb5ec73b174428c23c48027723e7462adca9b55c
SHA256ff07f58bd013aff132e8333a00675aac7cb83d5bc1d0dfde5c52ce684c6a32df
SHA5124fc610611e2e242954489daee346cccf899039a3c07887b4a685deac9f28f8bf5da05b523b3cf633febde48049ff4307aace92dd66f5a4fa2fb10fdb1c9b47ea
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a