Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
65b5aeac1924ddbacd47f776a857b075_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65b5aeac1924ddbacd47f776a857b075_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65b5aeac1924ddbacd47f776a857b075_JaffaCakes118.html
-
Size
471KB
-
MD5
65b5aeac1924ddbacd47f776a857b075
-
SHA1
dc6069f9110c81a678dd5c01b63c0e713fef386c
-
SHA256
492e9ddb1798c3c073e8e3bf954ae0956fd8d8c042f0ad05da65d27454bb66ca
-
SHA512
1e5cf3025306b2cdf13df28b5e6ac259eea727f411eaea45025dbd399f3fc5eb9d610959413b18be8309314e024b79c19f6853d4fd510f1073854ad82f35df6a
-
SSDEEP
6144:DsMYod+X3oI+YNsMYod+X3oI+YksMYod+X3oI+Y7sMYod+X3oI+YW:X5d+X3b5d+X3Y5d+X315d+X3c
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9089c0edf0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9F04541-17E3-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f68899b3d0088bf431fe3743b29552a48dd80a5a9c2f223b203b3bafe5a866aa000000000e800000000200002000000069a08e17cc9c3cced1da0ab6203d9df6bd5bfdc0504ebfffac2a9217c95af4012000000092b50243d0bb5a7eccea2902cae6a78a883e59912d828a05d5c7e0662a681e4740000000d02f433210861acde8e505d1003caf7d92362756e972397ab7bd418062b7c663e4ff1dde72aa1678e0787c386498fdfa37a745044c554fba0b33f121decf8c7e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3012 iexplore.exe 3012 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2984 3012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b5aeac1924ddbacd47f776a857b075_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD505fbd8fd6d02c904baa0077b87b32edf
SHA1cfc4a089ddb5ad4b622128962be77f3c8dbb39a6
SHA256fa924e3bc9504e5e15a323c71b0573b795ab4eb2efe62e7fc9433a7510efe9d6
SHA5120b6f7790e0d8cd6192dfce7cee7f425c700aa8d8e9f354bbf2c4f28cdac1d69c05f062a5122835a6509f197ab0aab8989cf3fc12e7c599c5bac2acacdbb857c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c975418cd7e7041e7d97759158d711e1
SHA15f9bb351c2ddd6ba0b6e305bd9b39079c59254e2
SHA256d9477ee4cf87e16a5dabcac5ab1095d58f3dc6fdace414af8722b054dee0fa47
SHA51234cbf7af4a5754861ca2c61fe82c6d6d637322f59fb4837eb2c0969207583ad50cd63e209517e8086afff09aaa680aa7294c51af2aa593fb1f4811a3d7ab339d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56f5d84e2c98b602e1a982713e2f26ec2
SHA15906208de89334b6acb5de5a946b0c2ca41229e5
SHA256b514ad2c9c960ad961738118d25509a7c7c0102d24887206c8026d629227fc84
SHA5126a249b1c3a312bccb4652f25e251e4db89582c76af87b19a2a5970c30ca8a6501dcc3f44af36fa58cb874af09fb549e42203f3cc59ca9338378a6fbe6717693e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b3aa2998ee6e484a746694c3f2b259c7
SHA1297199f8801eb5727a61567ceeb3e94eba6f4388
SHA2563ea1db4a1070c88db01734dce207b2d6102c9db3257ece9f8b8b0c0de9c2c185
SHA512361369a65c3757294bc616f58831f09423cb2cac6eb955ad58b5db6784a16a9e26eb797f2472b32010b148b451999939246afac9884625012e9aa9d1410b2870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59e8a643baa791c812d5804dd64020657
SHA17fe6f7cb2413fcc7c5e5d0b8872611c61603d6a3
SHA25682e07bbf46b8c714a863939c57b164936ba07a2565db945abddcf2d37d4325ca
SHA512abf2a9361e30dc236ddc9bf32bbd069ca5cab2e0fabf06429986a7649d0c584e7aba9681e86f884ff2f57a8a0b6828a37276cd47ba2e2203dfef9ef0b244ac0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fb80f8d73cc0425bf8d8526212183488
SHA111d0bbece7229984e8f07cacee50b46011880f89
SHA256d0969720e7a52bdad1b9c34faa7f983c8935264967dca645da7e208c1206238d
SHA5120d5f4cc500aa1d06f97f9821926e1a399f96296648ca4f4fa312fc105d7faf499acbbcc4ccca0444434372a8f929379fdb03c415172aea10b2964d69803ffbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5027d2b3c65b3402372626beb88ef9d5c
SHA1aa1e91d85665cbf8f9b4a4c81e1b53553daef609
SHA2560050b5594e032aa655203dabf75e34cf67afba50b843522e7bc3ec24f8251837
SHA512c63acf4bc23148c09551fd21a98920ef923eea4eb8f9c0f39d4e0139d8ea49c7c5df8e29b0300daa3189e9a421fa2c1d3b63f25d6f97ece7e392e68d4e63d4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5328db315b354248939f6e8d6aa466fa8
SHA1597546ff572304460af1c147706f9114a01a5254
SHA25641b888e7d8de383bbe270101fb5137253b8557d07c26d6cc23501f9b3bad2f3e
SHA51271824d5f680aa8d373838b89c97728c45f9a4a4578c8c29a8327d0f7236aed35ec606c3041432b038ad5ea4154e0803c2827b62d02a19e051552baee46d2e293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD561c4d062d9d4b04e17d5dcab8d8083b1
SHA1976c3e6b899380ee2652293837139685168c9ed6
SHA2569a43273ff701748b3c8ee2b64fa14007ed0d0b119d6bee8dfcf83ccc09e99953
SHA5125a03cb210434f17836fe7b9667dca0f3e8775b19f28e65375be8e303256a9df213b3c21921da95afd240824d5e007a40ac2bca9f8e6765c13a0300752e248d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b4f54b684830c334182f2f61667c953d
SHA13853462801de860eab2dfaab5da97b50041cc1e6
SHA256330c0d49abae49c7484a723c83b00ab3d548d7fea68002327cb88b9a8e99ad1c
SHA51235814a1a165f6a8c290b1df427e614136861167c4fbe77475eeea8e2c7c12164a61025379c99817f8495e585d423f0aa4ffd4bdd19ad53ebd1c7ebf81bc374fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD583cbe0f383a2ff6882ae4b8bfe6b3cb3
SHA1eaec76edcdeffb66379cda5f1da7589afd2c40a0
SHA256f9fdf2ad117c69f3833612950ce4cb6b8d98311390434adb24a0ebf5c3f14e7a
SHA512e937e843cd71c295da02d450e7801cd4f767302fa6601522245e763652ce292e41d928d35a28b19c0cf5458fde0ea8155cb91ceccdd8b6c2351318b2bbfa25ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD535134a43b9209d3cddbb630189140b5a
SHA1ec030c0e040c11a9bb6ea8040646600f35df6808
SHA256ce1480639f09cfba92d996caa5a4e41e101fff380c283daafb376e4b6f9ed5ab
SHA512f8664be1a9edf28d9b098a787aad068cf59a294d2cf8cf180766d6dd1a7dcfbee77b3c8dfa93e3433b28375a8c0977efc3bffb0715a412855a8da606bb975b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5251bcbe99786136c8b931f7b3c318db0
SHA1c2a8b0af1940e071f41b0e000c460cdd0879210d
SHA2561ee15d26095e9e504cedab567dcd354fed62d40ffe19e86bf3d795167db11d8d
SHA5129da89ff2955f08c1aadb7dca8289ea25fb930ec00d1485bdfe3fea03beca6d92d43984fcd1216b45219d2c30ab9086bfbf021de66893bc579fb8f2307967433f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54b495622275eaee53f40fcac7ed44cc2
SHA105aa853ab12fd242bc0eaaa11344d331dd54553e
SHA25684c9da945f42aeb1a82006862e71e0cd83c2e76befba66881ab45805a9675a1c
SHA512e8a9ae02ffd23723530417e6e28e045f1a1c39375e625e85df8e390a5840e38000c9630b6f0119396f821c328c61373196a2da1c90833b33ba5a329f54a66482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5440b232274f52453cef7d10e8209f66a
SHA1286fd4897c839804b558c402166b61c55bb538db
SHA2560f39cd15c515ad8babbe31cf2e01905f9e5e026231b7f07754c13c99319ccee1
SHA512c5d92eba35c10360e688fe4eb66021e3b60054d0f6f30a297baadfd4f513cb0a846634f7a9e22adc98617e04514615afe5e868d09f821e642be892b798c53599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ff2262d3664b5cd04a4a4b4008175af
SHA1eb0d4826740e30e23cf920636fc714c77fc674dd
SHA2560dcefa0eea4aedfd51e0e9d9082351dc2561ef27d64d3076124c4ed30031c358
SHA512e078b8be3d947e4854a6d2837a1a57ee36a88acd8f929fbdc9ac3fbe25fb325da60b7e525949ab45c807302884e6e7c181b83617ddff1204ff5312f1eeadf320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50dd1b49bf6e8e3a7f3632b61dff0b8ff
SHA1714d9d9dbae2187eee787a8c0d9dab713fefe4d5
SHA256185b9e0c3ba4da88b864b06d4379eb7ffb946274d5121ff19859057f8c2c89fd
SHA512c87e0e0f0193255e6459bbfc4f559562b6c1c9cdc723806989c5ad3bc33f1bd3a096f35a0b83a29a658cfd69614e70777a1b5ae669bfbe28b150296158d25d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c0036ce6ef1f45bf94a0651652c73cac
SHA197555f1346ea49f4937601fe5b531c2d606d191b
SHA2561edb01ceefe40b00eb4a4856fc529ad434bc970794e84bbd5d9735424492eece
SHA512cf19bdd251ef241819c0685df3f8503857f469f87bced151213f4db5dfc63357db72b4576e8517c10a0c36e10275f6621346c58dbb99f640d82ba672faaf62cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fa6c10f09706dcce0035423378d8aaea
SHA120fc5399631a52482117df262154feb67f3f4765
SHA256f63e6798e90046dcc857b86d5e418aad07faebf36e0c3405704ff2db9b9d26cd
SHA5122d2787cdbcd39b3749668ce2f821e4d241311fb9284e3b36358b476a156c9420cd6721bc120785bf0b767b8f595dbba903335f283070055520c785e4c4292d49
-
C:\Users\Admin\AppData\Local\Temp\Cab12A8.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar1319.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a