Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
65856dec55dd2c80d38c6e89c892e38a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65856dec55dd2c80d38c6e89c892e38a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65856dec55dd2c80d38c6e89c892e38a_JaffaCakes118.html
-
Size
9KB
-
MD5
65856dec55dd2c80d38c6e89c892e38a
-
SHA1
dd76ea0b3ac2d85432e5dfbcc92cd899fcda7b28
-
SHA256
1ea6a595817e02b6b84c8912f2cc9996cfba561e0ae043a19bdb5af3810dccae
-
SHA512
4bfb8f072fa38bd4c361b82b5b72d546782aa5a65436cd390a15e176f3edf616f91187cb800c0dc7bd8847ef0749ce966b9ea9b7b09ad9777c179063d480607c
-
SSDEEP
192:CBgZ3Iw4yGxfF4bWEfwsxhT5jHiYttYaYHz:hJVbWEXt+T
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7029DDA1-17DA-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e08e0c1fe740904fbd0b1cf4355634f20000000002000000000010660000000100002000000029cfc2fab0589899e2be1a658feb266fca1874d8c8919a775773181208246031000000000e80000000020000200000002b840e5ff93d8a6c160879b2f1759f0b5f0f00e585f40e0e057dc6da76f06a7620000000fe7a3b758279381a12a2e233ac88eeda993803e8acb536e9541f357c3abe1ed14000000025aa27bb8975b55a51bb2a63ba65a06182e1cd75db395c195736a236c9640f7eaa938f8910d1caec4029ed34a369171ca376329b03e3f8a25c1e3f6a64affa58 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0222045e7abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2200 iexplore.exe 2200 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2200 wrote to memory of 2912 2200 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2912 2200 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2912 2200 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2912 2200 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65856dec55dd2c80d38c6e89c892e38a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50064f2edcd4dc93bc020e5a91515fc80
SHA1ba829bbccda13f67501403cb48d9e893f3f9307d
SHA2562faad3be72775663f652c65f4f523880b48a1bd89637445d48ee15e15741b9cc
SHA5127e050c9f6310f9a7c2f1c14b51bc0622c85c74fad9fdf5f165d3d71704344d0fce42a2fb5149efbf6a3baab058b237adaa69c5e377c4fad6cdc5d7daa71326ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529281ba778c3b12c6c4962591ac99c02
SHA10d92d957663c4ff5e1e3f437a5d6aacfeb278815
SHA256ccfa2f4df0866df2c209074eb70df1b758c0dfdee1dcb7afd7e04dab70a779f9
SHA51205f3e882e0fc947696c26aa3f0a0cc5d654793b66b2e86ec86575b9e451af5351f174f31842fa8381448598af185a756d20a81315c063eeadf30b02c6b60e34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50394e94fa0e656ee095a007bbf6d5575
SHA162d837cd680d8c9a1bb680601a2a82fb49576bf9
SHA256d024cd05a18ea6290ebb3538ddfff5c4feb3bca3930efad664568f88c5ebeb87
SHA5128d6aef35bafd9ae6026c1ce91fd147a30cb7a52476761f3d90b0c757231e78c392274bf370dacbddcdeeb1a9d107b54d989ddc1f93cea4d608c04df383e77e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2fbd7cd5b86415b3364d547b69163d4
SHA1ad526a37f7e37d9bba99469d7ab0e2b876dba96b
SHA2563d74cdaee45f1f710a9b3fa9db1b53d54743e316c51a9f43d6d48e8706376bae
SHA51242a7c256bba6ef47ede68c1f5c6b149dd2b7410664e0ff519abb6a4b75d13d9f3feaf461c5d91a627db59204ae8644f478c8c7c707d324b2de7e5bee1d311808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d23ece9d1484563bafc8bef8216535fc
SHA16f04d8d96ad6e7132259d76ef3ee70cc4f591523
SHA256d77f2f2a81d92896352a8d4d15810960bf02e233f822abe03a6126cf289f94f4
SHA512cc6345b90f77b29b75423b1731fd88becd8cc827c16094cab61cbcb5ccc18beaf994dcd6f27c788cdedebda102f452b30ca22d9a28282dc45076bfe3059d36c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673f7d71e0210daa4b5031376ec04a91
SHA16fd16954044b9dc0c9ee1678fcdb93e4171faa2b
SHA256cb416eb922f9ed003adc91cbeca8933b66c4201559b7024f4d6b75c9446a7449
SHA512faa53d62542dd04642820257cb419b9ad855c96fbf25b1eeb3baca9d5a3f28547211a54a59ffc8ef63f12b8b3ed61ab7548bbe439fe8aa5c6fe688b7f34e9798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5608dfe011d3e6867dfb14d4bebc20246
SHA1ebed5c4f7815e61cae52b33780298bcfb77bedbd
SHA25694ce3df77eee68cf1fbd1f3162171ca51a9440499f267ef0b185ae3561fda750
SHA5121ed7a9946410a79bb8d63ff8c1855362c32d090268d902dfe4e723e7a925c68529c33e68c09c31973227a44d9562c2d3e205471fbecbb802d6dd6449f54013b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e9a751880a31128402154043b7c195f
SHA1e91141536daefac393cf165dfdca33a39b08b099
SHA25607bf2db5fda76aeb80453c528ec1d81ed8a6cc6897be1a2ec368f40809e5c5e1
SHA5121834f1790597c2be7571446e2b5aa7ebc32b232e7daea5c784668347609e0dbd1f889dabf046739ea7ccaaa38605679c4df4c6fc88996a6b6cd7f728a3d17829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2f8c582ddb4d2c354b71cd1866fa8f0
SHA1c8523c12d6181b54fe518f381e15efee387355bb
SHA256322e3df4355d62c0d8c671b8d0f278265f49da74709e70e39dd08dd5f4586f4c
SHA512c039d4e625a673dd46c10efd5b7f70d532b9a128bec15c77fdef789674ce8a76a59e09b628848a4b8d396937979dcf4de80661ae17c9355cd113bb1cf8c081ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e221a3b6edf247983602bfcd5e16e3
SHA140d0137d24f25899ff0591583470c526781e1172
SHA256a283520496fe290abf9d1a22cea67ee4580e78474a4dd6f1da9b86afc04589de
SHA51241746c66d2abe6eb1d5c98e82c14b0b3f2a7a4c05b90f420ead6aaae3d2046e8bb1a7a1b89de2a873192bf790e87c4180212b4308598b4a648b1b7fc84da39d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e4be4d595c61a1dac75a59408dd7f3b
SHA112dac0d910662cc56cdd26997f028095d3013ba7
SHA2561fd0df65d8ee755792e20ae35abd79bdd2ba182290f9016f9cb6e2864c832b19
SHA512bf5feb7b3e149cb6f46b35ff3e9d2a39f298dd1679fd5253be7923ca7050b94b39ec435d7a6bf041b557908d8fdea10e303aa7bb5dad6f2f5068c6fe4b424c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0976083c0bb0a42dda0acdee41f3b64
SHA1c2589e595c40e7d995015dc72b3c65a57931b3ef
SHA256c14a16dc53e0f130aabd3015ea1af48f83c459ebe5b1fc75c6437bd1715290f3
SHA512be4add2518efb0db841297d2c8c543dfe092c5bb79c758bff50ee09474f3d1fb5259b047d62346a6fca4c2c073b4df7790416e529e9216bd1f2087fa74efded4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d7adbf7aa07c3d6516bbd484e1e7deb
SHA1867189720e2cc1ee9d1c60f167a8b8735e91efbc
SHA256564fc99ddfb9c11cfd03119225fb991ab5775f191f0cf96c81456ed332bb48dd
SHA512ce4220880d49a6423713da3e77320600644917abfa59dc1b0cc30ef5105be10d33f51d7f06c0412374342e7c1f30bd79b6cbcba2b7911b4e209e07e48eef731c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe04d2e134445e46a59268ab58014234
SHA13b7fe87f73d898a5cf87004ca55cb6c24cb75e37
SHA256499c9913be0d9fe6c2cfc0abeb6620b28b838d82df23320c3cc41d7cc043137f
SHA512ae7d3f83b29a904ca8db6e04e510e3ed6cabd54b35118300c1b4e4db287d6542ffba2d2f995138b45d18d17407b45b498fb98dd427a5b737f6a8f3a1d465b0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d798af2b8cf24bd57c41b02f12f022a6
SHA11ed5e699218225d28dbd2c8b53b68c8d3fd7edf6
SHA256a514cdc0dc6548f8d84ec917d02fc40191c8783b82a07ed3559a5b005e05275c
SHA512f47b29105125e06bf41549baa5cb486afb65eaa0c87f74aaef4d3471b10bca72d1f4e0b08a5d9172bc50942b9ed0de0517a9cbb89b233bc5510c659c9e38daff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a869d2e74c141167e93c7570ad2fa0ea
SHA10c7124f63351a291b5b5ed9d5de318e97a6282ad
SHA25671f4fb2b00d17ad646db5fd04431e3c0400c1051de891ee7a078e15519fa9ce2
SHA5128c308093675855005698606a72cbe5297dc4cb28255a649503fb42866f89cda37d9198b7113349e01472dde53dfb71c8ca907f15cb7d197d7d6f4d0a006161cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fa557ab4b852c0bc3014185fb24968d
SHA17fcebb9778eab8573d219856cf059f2dc1f4ba72
SHA256daeae3dcb94db5dc0f26e22cb7313e5c3700f990044ff2eb30a45bc812e28a24
SHA5122eeffcbca29ff89de7e1314cf06158d66131c06821516412617f3339eea6e5c27c294515be80528590f09853cf3561d5718d13742443d20f777689b4a3c38f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5044f2dab9ff0df92bc85fe6f601a2ef2
SHA19d9303202514bb95bfc36366143eaf0480ce79e7
SHA256bd104386e5bb3f0106f6980a5855600e351a05a7472df81ff85d720951ca853b
SHA5126843766bbd8ce4a6c58d4c356fb191339e11849c566d58fbe244fc69e4f84be151f3fbf681c9d344215c8869af3aca937d365f041f7401d5942c540a1cd95c2f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a