Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
65b3db75e8e152b63d7b5d04d9be29e8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65b3db75e8e152b63d7b5d04d9be29e8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65b3db75e8e152b63d7b5d04d9be29e8_JaffaCakes118.html
-
Size
73KB
-
MD5
65b3db75e8e152b63d7b5d04d9be29e8
-
SHA1
0ff34e2c80cf286e121874bc8c4a16db2c627512
-
SHA256
41ecd38e462a750df0b1bc5fac9614b4bc03cbb9357090910006ecd74f8c7c2a
-
SHA512
d119ccbe75bfbdd82b9bc32fca4f966292cd6c74a9aca0dde5013cf7e52b983bbc009cc6d4fba097d48fa0a0809195c0be7d2d5b9ab84866fb9ce4ad8933d98e
-
SSDEEP
1536:Slzd0tyMvyBuXoE+XkGUKfjy1Q9mCfb0+or2lhd/EiraiFq1flxtGbkBW8Pl87L3:SdMvyBuXoE+XkGUKekedo3dmzQI2P2id
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000009d002f067085ca03ba58fe49e89b6a035fc5da2c3fa822c96a413b9988fad52f000000000e8000000002000020000000935a02a8192bd784c262330f7472ec671b3b345b18d431802c2e94df16105ffb200000006f96949f01a47e225962f19f033798ad22164c8c95e1199d2fd3e97df5cb26a540000000c7101d395211eff2ea95acb167f42013c39f80f23db3e90b1cd8ab63886cc016b81c5f64664d5f1d1938fadb0b9441f8de670ee16a0e5fc5046871506dd37205 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bfb25cf0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82E41741-17E3-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507006" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2244 iexplore.exe 2244 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b3db75e8e152b63d7b5d04d9be29e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59344ffb1b5b00081288231dd2084399b
SHA176833596864cf80e0b3f53689842f92d57327f51
SHA2566a20fa7b11dc9c5c1e6dd8f5e8cc065de4ed02ad81c07e97274970be3cd2f118
SHA51284a2b95ded059c867f7464fedbcd387c48737fe8eff519927914645ebe726b4f3d34ddb9cc3f318a93c881ae372bf29fcba4e24603b8c44d5197e38399975fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562f29f9c9ed6afbfd59e1d7f539b53d7
SHA142541e499b2ce6b81930ffebddedc4ecda1433f2
SHA2567d13648a74f79a3734ad6cea446460a2d2d1cedf85235d6c07d48f6f8ea08c8a
SHA5129855bb8c4385f9fe17067a2df1775fb398e9abcd2530c0276bcc003750b5b9d9875a2bb6060034fd624676cbae307feccf379ae0f487962b43c282f7700f928a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d8ffc76dc96435545a14bf9339af66
SHA11818483d45282631acf4f75e0f624994ec5223f8
SHA256ebfef13d37c16d1d54b3db2d202a78cc1a61676b62a19ca24e80ebac1f81cf47
SHA51231760f08a21ffdda472feab69e1fd8d3b8fa0185d26e1dee8f4ba6a4f8a2467b1f2ebbf5e98713a55526dd007da9aedadd31bc7e927f8cd8e6d7b0abbcf7e8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5135588dd8cd6100b89e0a69b1e9505c0
SHA1c2b3ed3a7397650fde37ec6302c49fb8ce6cfa13
SHA256e93c1ee71b023715c1c64ea37baa3954c58615cf22fae87eae8779a70fb9bcdb
SHA512a13a0ceb5793d2ae4b7ccdd65dfb968265036a5a637a876375bbc3629915724a9f463a5b6cf77b20c27e913dbf196b9d372a43ddc89b273520d1284960c8e9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53153fac7923dc2af2ef1e9de1ba1b997
SHA1609ce60292e0e86702cdda731429fa17bb330a3a
SHA256c3f485c8abaa0b24ecf177306af5cd6ac4796ab6e88244d22f41384fe77d5636
SHA512d2d1a37b818e1346c7996efc633375ce6f44e64b848562efe8f19f57833be26bc99364916c1098b62034f8709c3c55df27c7da39cd7f07319624292e5a5126ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b781bd5ccb5170f2e5d28fd349ced38a
SHA110dec8c7e64dc40b30190109aca73d7f8a19eb15
SHA256b3baf211e923a2a477d6113007130a9ebb87327f909096293632846f88494eb0
SHA512b9a431c1298dd56e076316b6f6affe7ae7ccfc2354f1a7587f0e954445a01f591e6fa25b0271706258e70ed9d406ebb98aa719350752080919ce81356854a77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50091b2bfd59fd252cf8cf77217378f1d
SHA1b7af4df93550d11312407dd09b4ceae0fcbd4bd2
SHA2568771f14fb1e5f4927e91b7990b121f31a4aba81b8eac0e0832124444f9a526ad
SHA512b1c43abd1930bd90e78c0ed0f72391592b5c623bc8880119cf7897b70d695fca671a57754379cdfcb429c57d745d61f669c6d86a8bee5b0a7d8c6072eec4e228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522c9a80deea75f22f963bb4923182ef3
SHA18e879548b5578bb2706156f307a3abd2e1278b31
SHA2564a10ea9da7449a5b7ee1b5a1f5005a06b228aab9eb37577caf90610780632e94
SHA512f49d0c7efcefff782d20d7b552617f6be2de765057f1d55e9b40d4565b48c48b32c6b6f324353fe876dc3b18df4be564d5e0c5057ce2fc2a9ebbc1628f78c8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581f407ea18391ceb3b0b5c43e32813c8
SHA1d14ec980e1efe4a2a9a968560a6fc489a8ecab97
SHA2565753f684f5da45780327f60cb2a2d8a162a9ff9cecfc82d55905a6e3091e3562
SHA512c38434cee84275fdc3acc61c593006bc8c5d8db6b29cd5ef777f63032cd8e6c98c6ce1c81f05c1d505999ca5d3bc57aa03da12158f9861a217f319f6ad97d5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec4d897d87b9b405c16922576c3ba9c
SHA1bdd309fb5b3f346712712d5fad279898ba3603a2
SHA2560bc071436bdf7921d05f618bac60474049b0ee3fe5e1f1de2db1c828abd0f3c6
SHA512a0946179c20cc15a91fa0f87db4ad7f16561e6b53f94d3ff6767d0f0450e78dd136e264deab0c63fd66236d0146e9e856076b30677ebcf41be6bf0444e9f67bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd3192071ed5f3c4170aaad1faafee07
SHA157f27edb92900129432372c76c3424e358b85060
SHA25630fa7d6a37a6ace386cc73528bf0c92981698c6c1ddab379d1c92232ae28329a
SHA5127f126f39c45c67e2aff3c310497c2a1647989a210d7bc944a9a3ea52f6246a37f68df968eab949cf5978a231a46b81576eb6fe32ad3c426caab9aab3075cce89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560515a9d8eee1e4f11c147a9a50f42a3
SHA1ecb0af4c4e694d3d7b223b17c9e455c2acc16691
SHA256a15defc5022e5146c8a0ae2d24b65a1b62bdcf23d5e2ae29c5c43ee7d7414dbc
SHA5123d0db401e4d7f57ca0cc23b46711064055a918d15f5b9a2418ccb809753b19e54c572b1ea5ecc2eac8ea5d6b744ae0e583be8289e92a6992d6623e76fcbbd936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a00a66177f3d3492b590a5dcb9c436
SHA1f1cc5597db930249ff5c2f0fbef43cd6bc5ec79e
SHA25664155d283b1ea92a2c9b0d7afdca3c50b029e3896ae982bfac446a8ee141a0cb
SHA51239eb847e17ce4ce32c2041b401d3c19e59cdb502a09ccb59c63c84f11d5d6d2368830bf2bfc787d9730f2b10fe7d8cf2ded2217ffa4ff1476b148bae698e2672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59343c8ac50b1254a186dd8da20de3a90
SHA1bf9447d624b50449b0ff9e5632909fe546b91073
SHA256587e45afdbaaa47e1a7a38c6866beede6c88282c803e21d7692c888586c6b319
SHA5120d73c25d3ea8d33a79944016fed2fb0d2a636fdb8bf855812e2b9737ddc6ac0d1003432c0b6e33618f0cdba3faa98646a510fedaaa3a3b2458ec46c1c703d09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa4bde494b2db61cd11e298835c6cda
SHA1598dbe4ad7be2f67dbf3b236c416e234fad96e9b
SHA256b122a7888883ecec1ad401c76de96abbe41d1ff27083ff1d363d13fab5922365
SHA512ef9ba1484639dc9fc0e5638736cf975fd089647fa0ab7bec510d8f7e511e0228e38bf3a9cdb01e11e54f637a8a58c76c8e6079456dc3fda1e55ac139ea7da885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e52b3e70e9dfd62cb190f22d3d204d97
SHA16522e7da692e327bf94fb5e6c6966deaf3f9bdbb
SHA256fbda700404b7522e8f150e354cd4c2d64be4b2bb47910a67b82e37ab2bbac111
SHA5124147144a8fd54369070c64daab33deb031e2cace4f8912a27174be76baac31236cef88c26e4356757d63a0d6b5e0fa3141a1f4e0c969a0f4388bf156f02503de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712fcfcf36ceaf7b8c3c0272a57f8d07
SHA1fefc5b21762327b0d739c1d3e0b9ed6ba75cf504
SHA25617bd7644a69bbc32fab519ec82bb7fbad98fd01905a6691eba5884961b295ae8
SHA5124d67b6a036d6048312ecbf0394a924415f4daeb60e7012d8476e1590430871c609e93c8b2a73c475b649d394522b42a16b09ece7df367bfb09d197fdb24aa866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d199df1632dca4a5157fe72c9344bbc
SHA189d802e16760f9cc84ff0101198f4ab8327964a8
SHA2562486346920804aca58cb90c079bb943c3752acf091e95279c6ffa3b466ac123f
SHA512110ddd39df26bed417cb49d8003873d4d07067c356a2c87ce51cc3a15d813676f72fe245ada1dbb1590327c3939373c36e47bba78a3532fb4a0c9560e8b5b860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503805fb16108e4dd3abb5070486a9f58
SHA1072f6c320bf7b6d12781bbb0ef8df755be84acd0
SHA256c7975ab2b1a54d57903f9d59f7e8d8dacb42cfd291ca3bb17bf439210b88013d
SHA512b34f8d0111eeeb24ba657c639b42420f92bdc3462952dc73ce71b0c894097cdf7d7dbb87e040bb3b36e0019f89b1195df6b1cacde5d32fbc8b7b92b8c0e4b730
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a