Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
65b3ed021a686445a6830ee1f20be344_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65b3ed021a686445a6830ee1f20be344_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65b3ed021a686445a6830ee1f20be344_JaffaCakes118.html
-
Size
2KB
-
MD5
65b3ed021a686445a6830ee1f20be344
-
SHA1
31178768e8cc455842a94d5c1971bdcacebc5cdd
-
SHA256
fe3cb01aa4fd0daa4dbf3234c6140d2c8edc51da674250249ef65511c4738923
-
SHA512
b18075710176b4b80b4e0643fb5dcc402921537b50edd2448b1480ababbecf23840159188c81d7c9a3198381dc0d8aff154c9c9d14e1e80880cbb2c280571940
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d049395cf0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000be1b8c95661f4ca7496a3493b9e405d08c604b7f9ce2fb5988dbafa06b04de5000000000e80000000020000200000006c21f6c9fc2d7668c74716f4d3690d00624241c8a97863a2fa59046ce0046e352000000043a32dee81575902e03fe4ea9e377a99f88516736c2d1e0577f702a952ab970040000000a968a2339271f95a824103a4d4982c38eec4aa68d88ffb50ab7c918b5e94cad8ceb274f434799e1addce2427b9452e33a8a8be3d486963b0f139252e07d00683 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87AEC681-17E3-11EF-A649-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2416 iexplore.exe 2416 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2416 wrote to memory of 1824 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 1824 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 1824 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 1824 2416 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b3ed021a686445a6830ee1f20be344_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a884ee4c39f4f6f919b83059356b13e8
SHA14af4fbb83e2ea1bc135ab5cbdbee5fa05dcc2974
SHA256d6f60b8abfa1089724ed0aecd7707d01fcb40e6162e5bf08c7c6f93d06cd497f
SHA5127a2e879a82d5a2f5c60c715dffc491ac859d914456eac75607e7f5226d52040d0f4d2a029d3db64fa64fb4eb59d4def4f87cfb564afc72f5006a3d759efc782a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD578690b152fbc8b38327368d48b3521eb
SHA1e174399e2f2392f7974b4ce4d5ebf7f0bea19a31
SHA256adf726bba2f7234055001e27d52c6b33b64eb8e0df7967e35b98e2f9087c1914
SHA512cf26013019f65ff9d8b9c4c876aff54e7dfd9d5a58cad5a47cf01cfe43bdfcd7ae979a95744bd7b4ace00ff7d7cd16d8651dea985bb3768197d1c9cb29a012e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52f03dbfe2e4256df8ab4d64c3192ebbf
SHA158e83b579b4f01ce54ddf44a9073d38713333a9d
SHA25667f1944ab08bcd6691c80e15e524d6fa0b7d4df98c4e011d298952957cc3e246
SHA51214cca97c10b63302e9fd3e8666302854080b1bb08a7041c14d31574eda02e5690eec6574fb13df69214234795d5cd9da886b9ad611fbff94a3deffb0bb169167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53c412443f51821feb5a64d391e8e6a30
SHA1063c40abfc99a788f7c31fe8b2ada9a2288a3b3d
SHA256126cfd5c7b0c53140dcf0fda62379ad81e0ba55408de0b709e033e57e56d29c0
SHA5120e7ce66760e7b9da84110b671b348f64ee17482b9bcf07dde5901966dc965a27d5377957086d6fb62c511db2af306eec4e93901664b84e53a83576cd6294cd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ff88076f43d323893fa67ae65be2ba41
SHA1e68f2ef4887955994dc9174e6d9f36157348eff5
SHA2562e97c8cccfa52d4666ae74b88704c1674294dea89831ae16a5863dbe7389d56e
SHA5128b959d32e26a6e3589fff6e879f91c6ae5d97532b57abaa0eebeb1dd5430b91ed752bbdc966be204828123bb517c2915c8c8c3e982788c043b0ae8f86ee54282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55df3ad76cc85a9a59138642ecba0a50b
SHA1a9bd3877b248e1f38f8ccc58a45ce2241e6b80aa
SHA2564822c3ed6391d9aa9b29a919bad4cd057e71231d923c3a52f2d37d2fe2836e38
SHA5127d8531f756ed239519c56034d00781d180a32972404f4be4d7bd3a42a2d41ebc3f16e844fed037687665c00673c182681eb88976da058627c1e8fddf6aae7cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a38e5d9ada7acb3205d8eaecfc011b5d
SHA15732be9c8df974351f8b8a0c46bdff9f4d87543b
SHA25681811f4c72c8e990c009ce8687b717e02473e9d38407e63f653b9e4fc4d17c01
SHA512487ec6db15d33ca69ac23e0ae8ed38324d27592157b809e1d37d5bd317559eaa666ce4ec5c35e0a4aa2fa6c05b2ec13d3ec3566ada959801d7ca0967430a6ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b4e928e002814580bb03cae6a1ba1bb3
SHA181ff3dd8ffb4eeda022c4155dcc7135e20a93ed8
SHA25687fb34fc5bd931439de9cb86be9870e139b94f8b6f58ab63efed3e45394d32e9
SHA512c6bff773b5106c911a9610146363e23c60c268a1161b799f76c572e537a956aa0f24e4e05e6124f12e64a92cb339ed3fee28afeb9efe127a124e7639ce4d2340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD568aafa1d89fc8c33d0345e0661ddc682
SHA17b83025d2c586f78e0b0aafb1532e2607d86acab
SHA256b3dfd5212e7b3126a1d28b43bd0847a9af14a3d5aff34467d443c69a67be1924
SHA512c39fde9c1df1565bc5005e5927f34c74ebc70e18b58cb35c0269a9ed38728704a99c0db41d3765717dd3b4aedfd626b51b209b99c52ca47f69088c34beb14cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD506dc46345fc274c6feb68c950ab22ec5
SHA1e6f07e4d1cea3aecc2061445337daa32c1574b9c
SHA256942ded051c0cbcf7e64fb5863ba12a60612763202f701514aa09cac3c6586627
SHA5123e3403802517765f9ee590895c12aa4b9831dbf93be3481d63e44f0feb59838478d768d86f0b3a86523a25e0f909ccf8c4c628f87ad02034b350b10124ce2878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a7e08c64e61d089c70ec16e5926d0eac
SHA1f6563f4c5029e9e5cafb000ad7d61e71a2cb16f7
SHA25647bf4a3b1635adac7638e198825db20a8505403e6b86a9c99439bcaad726984c
SHA512aa064d2909392f8a79711107587c50c377b13e0e68f1956c152699360e8bbd5e983a4cb07c75ba68c00cb49d78d6c1518ca3d6d80d664191e8e6ecc6bd2daac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f4dd0af55b4ebfb5910b62817c60d510
SHA1eaeef808ecf6935246ba0bd91a82d0d210142965
SHA256f82193470e676a0769c8df67aca0f6135208ca24645b3b67c2211fbdac096ab4
SHA5125a411a02ee4b9b7cd9895dd6cd3fad6f6f9f0468a78b4edd5fe9d6dc2a93e29aaf1d4100572292171030e09c2eab4a4c16e7eb503eaf04fa1d3d7b5ee6d089a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51bb3723877e9518e319ce91428dcb56c
SHA13fb73bb1535122365cd21b95611ec6c9d2581fae
SHA256397ff7588658d86939f28561b4897d188b076c1c7536cb01d84b87cd92264f7e
SHA512e67ed70558028faa4707347800762ef74a32f57ce7bf756a245816e6e524ae4bb6fc083204eae0a12ff094d2dc0164e3a198a55b978b2aa9ec4550fda327feb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5340039544dd486d9b54ca48b749b9f6c
SHA19e3154541c5bc9c7a851aaedafc6ea4b029edf8a
SHA2566c68c87edab1bebc398a893b489ca1f17247a1c2a7f8b92b80a5abee4195f681
SHA5128603898470224de452f17e65fc408e28d94700089cb3e52e6cbbf7c9c6f893aa833205f03f4241462992c2ec825962911194f3b4a15cbfba0cfabf0f39064b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5602a15a426350bc7ec0f3cb778bf72ae
SHA19e039bce7161c0d96b0b780e22b26f630c0707cd
SHA25678b89ff14dc59f5a76abbe02fe753147e5f8a1aadc5b00309ce8435e102b91d5
SHA512736d4740ddf73562ba142226a9a58ebe675d11830f387036c8a86a64a6734e2446cd2d2f86d871f0b5de00676eaa07133bfcaf332b5f8c0445a534bb63575e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54f3389e94b672f2d62ee5563affe1b2d
SHA1fc80b245c424f859098ad3c1665a492049cc8555
SHA2565f119b1390016dbc8e2b82c89755c934b9b0595685e9143167a512408c7c7cd6
SHA512d2bb26e9f89b21769261072ab80f96a629c64fa5c015a60ce8f52c3b0badb736730dfc953f4d558acae5df2ee30a87e1f87ec5e6f301fe1e3e0e5ad3f74ca5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55b2109319206cdf2f06898aae7fe2a75
SHA12bbade97dded2d88c39ce27009f01369b02189c1
SHA256ff9bb2d4517137e3eefe32f2db6b6d6762598f8d589018ecfd72822e3a2479c0
SHA51273e70848a8efddfda243b8f7f6fe248849bb90a8d973719f3ec1ebea729489325abc380a245cd5a5258d68b5c99d7eefecd6b8cd4f5717cbce7e5dd4fcb7ce00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5936f8fc9215bb7abc68cbc545c37b6ab
SHA15828f412b06f36321aeb23dd4621241958c50e11
SHA256fbcbb8e3f206adcf0e5bee1d3ec277f9716bd713d7764d7c513d6ea2be64f89f
SHA51258c562051b59d3297de7553f38754c8866bc6af5e4fbd1893403ea615da26c1e3be59139ee46070a28731f94d1d2b1dc86bc2ec1d28ff2d75d887396f7c2304b
-
C:\Users\Admin\AppData\Local\Temp\Cab3546.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar35A7.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a