Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
65b5d02d099144ea9341dcc83b834bec_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65b5d02d099144ea9341dcc83b834bec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65b5d02d099144ea9341dcc83b834bec_JaffaCakes118.html
-
Size
14KB
-
MD5
65b5d02d099144ea9341dcc83b834bec
-
SHA1
459a637f3822e14049595a1a0429ec3b570b55cc
-
SHA256
86322761f4fa8d0e9a1ae3f56983675cbd6cdd2c1e1d45ab2903037508c2a792
-
SHA512
c4d470b67557bfb5849b969956aa0c2cf55a913389b7775f3b58f69e6d6c377801239d13f78d4bcb878111a16f85f2d6a1e453db2e7c6e209b1e740484696b44
-
SSDEEP
384:CyimkdKQiH/mXj6Ai7zy1wvMFfCHkirvV:CyimkdNifej6Ai7zIqMukiR
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7035a0b4f0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d7ac7ec3cd2754ebdc715cf8b0a2ad700000000020000000000106600000001000020000000bc3f6714cc5f330f65e0e4343b50bd1242baac78d4d3d59bcc155612ecb3fdc2000000000e800000000200002000000091ba302fc0316577f205597fc58ea8a3a586757c63d8b7bf374d0bf0d28c764720000000e1b3fa0925351b4fea277da0b495aa725727d63ed21c609d309c603ba2b53fc24000000016421dfa2fef65e4e1b058be6b64e2e024ade38a6ca00ea46a70e7d66303fa575132a47614cf6530e7e675d9cd1a8f93a903c789927258f8767c873b1e6848ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF4A72E1-17E3-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507162" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1664 iexplore.exe 1664 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1664 wrote to memory of 2192 1664 iexplore.exe IEXPLORE.EXE PID 1664 wrote to memory of 2192 1664 iexplore.exe IEXPLORE.EXE PID 1664 wrote to memory of 2192 1664 iexplore.exe IEXPLORE.EXE PID 1664 wrote to memory of 2192 1664 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b5d02d099144ea9341dcc83b834bec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec999c35b8ab9e0ce77d4bd9323f5ab
SHA1ea75210cc28353f0d3380bbc6fec830066857fd3
SHA2560b3c5e851453a6cdb2c76bf85d281c34e5df834121d8d9a5508ca1e58d2d32cb
SHA512f7bc9fdc44b59ee848753985570448ded404604a67def0a48ac9f4bb8751331ad9ac816a325caac2d67faf994c2f56c3ba398d64277d8f03e6d3f8b011b0872a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb9dcb25264bb371b40be114b5cf11a4
SHA10ea6142b7f321567e747848ff29620e2025d035b
SHA2565bc7f16f04b3f0ffab965f17d2934021db66d42e6ce598a3d7ecb509001e119e
SHA512d1dae91aea037b30cbb0a629170b4a8de098086fe558d7210e5e541302b34ec1b9a7f03a8d4489e5b2f0dab116ccf28a52347b5ce1b7895091b52049b0e868ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6afdea9b035f9bc328f07f1dcb55774
SHA1330d6b3d76109a04b1253680d75b9e9e26d7011c
SHA2565c2f1111e06e56e0a1432fa06b247089f141c8b3d840f0e3cb6c0339e1b65431
SHA5123d9b1cbb4c1575f67546949fd48266e089c9f9228bd6bdbea4bff8aec4c66f35633eb9ea0ffbb7aef8181be2dcac6aa9d026b21bd5476b402d31e4457a157139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ac7d62b47004229aa9a2026666e9f9
SHA14e155dc025990afac1a9099856291da4dca10a4a
SHA256c143c6ed4bcf2ae6dafa884e45e54dc4ca8050228b2a85fde73942b0a6efe166
SHA5124cdc94002fb6c233964bb375fdfb18259241309358d0ae6ed372fca0788c497ac908241659035ee293b31a22992953b9f8b591a2220aedff3198392d40a25143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d2b1f846da7a6d321416580ffca7df5
SHA119813ddffc87e9486aa72024d31b567a8f73ba6e
SHA25610ebed9dba9a9ba59db6efd8879ce4bf00ad89107ffb4137026e8fdd6e217366
SHA512020aa420c973897afd0c2792d4f0ef15c481bb9d1722fdf349f694a5407ce12752e0b268a853d3ab36385ea9764cfd039610ef72cbc85ce55177941ad3c60131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5149df8ec9995ce674fb5f4de6f2b00c6
SHA1bd4c81a7dcd0a99afa3aeef119c34f3ae2a08941
SHA256b871766198c9dd8769340139d2cb42c851d03ad688da0a632edd2170d98897e9
SHA512e7ae34353f396fc7f28659cd200101a1537a0d80aac31c3c31a8e95bb9fd98e35db886d5724ef5b20897e5e550e48cdd22ae21eb11c53501b993c01f1a801792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540a358e0a976431d420e0c612fe9a8ec
SHA1e88c50940240e27977899bca215c0d235d503876
SHA2563da7f003b8a13ec8b1ef930a6f0dda11aae068ca4e945958288749811175e45b
SHA5126767b86f28ef9cfcd5dc28bd2b9b431a4b169495f3bef0030ed4b0e0b759f336041c854f61bc758414745a247aa9fd2e686a2101c3197d94819dd597b6fdcca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c3bc62e52727f48e9ea711e34e63c5
SHA1cc8a9170d41e699697dc5a47a66a8231bcb3d2f2
SHA2568fe5aa9bada6c8306f792b7be518ed6d11e9c3f1dc0d366447715d730df87b14
SHA512a5da89f4a1146606dbc8cb6b3f4dd8cd4fe0569dbb3b040a6faf0e8a2673dcfb06ecac56bbae66766d2ef10b0533304fe75be2c211c9bb189f079401ef87e78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2a6d76d1c11a6fa40d739ea4c41121
SHA11cd90a0b2dd88717faaa1be176a3f6bd467ad3b7
SHA256bf8bc75a91f6ed5de82beb93ecbd91299153d2409b198b6cb80372c87421f68f
SHA512aec6c052810ecee9158f584b22db8950998002c7a0d3a06dad956d8da4409e1d48ee58f3c7951268b02d74c718a59abe011097187cf225932c243ea26efa497e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebba38185d502f3c02bfae7cda5f4315
SHA13d154d793d739a8aef9643afa9e5c4ef8e64b24c
SHA2561623dc7f70acb3943aaba821df32a795d296bcdedb337d0f6122e5ec48bd90e2
SHA512d804d51b8f83cf529d1e66ed871166f61d3547cf580c642300b08f5d8e4d1b5511aa7407797acd0379e4c24a183bf800129d8d1bca7eb368da319efa5c4dc515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57359f1d688e3d7a2ff49de9b0f8fe033
SHA13e4cdf1c5d184a9caeab3673642bce9dd3fcb232
SHA2566a795041204c4ceece045d3bf1856c1ee775f76db7365725f9582d5eb9e96252
SHA51209d00f77e7d76a3ec8708f1825dd90e004f608937d12e08c8779cae173a7f6a7134af10aa71bb10ca5b0a02c1141b836c18ee1e0efd686f2bfd7f6a60cebd45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c14f4cd1ec43ca61c07f666eb8a2b51f
SHA1ecac9ac0854ba6343b01ca363fc7528fffd9b169
SHA256decd0a02f0fd175dbebeebf3d6cd2d4bea96edb988c2d7f6bc42e85bbc665018
SHA512fcb1b73e35f05dced8f6b7a394ca3fc166218dc4e564797f386707f94060ed199eaa856b4404ffe88636665b827f014121761d7c6edd462dd16dc8d399626b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b07c178b820f7d7ea8cc703a93ee8c6
SHA1f3a2c02e33a1ad9c134e586abb8711650ae9628c
SHA25607e2ed98ffb07f53d0cb808e12eea87d4f77e9f1b0896b96bdecbf29bd9c7d0c
SHA5129ebf49ec988ee2e175ebad93f47fd57599001ebf24c61af64a928ebe839730e2df13dcb1b3c4093b3b08bafb7fee579551a91d1636761397e947be0962837e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f8779677464405b136defb03af88739
SHA10b5a98ea2aaa6ab5682f2728cb52debe0af6159c
SHA2562f7c65d9f28a63df6c8618de8feb77e7f42ac30d7012e61dec179c6d9efa4e60
SHA5125a149fae2f6a718643536ca2950de1d7e192d6bb68c81d25f00b5d22cdffe95f0192d3e03b608b3b93ed445223cad4803bff4b24a700c21f18a080120da73b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f1d879a74327cdcd6378d4ac31baa8f
SHA115a861d64d70cb12065cd440fa0db0bfbc6f11c7
SHA25680d72447d2038cbdd1c596ccc6bf48a570ed7ab8dc21b9133d01352b2d0af0e4
SHA512c5a01c16405a258ef160f72472589c22741ff5c80f5fa95ffd3cb9645d153faae628812adea7fc278c00547d818d50db8dddc9f7b4bfb2c501e03172b097c16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580de10c1da9097544ee7e810529dde6a
SHA124ba656bf849ded823031a0a5765f395ffb20784
SHA25661a2ca893cbdef33db2744ca510954562bbc594498af8fdc5b61afb5edce2d61
SHA512b1dd806af13723c72b633ae3b62e476db385436198c95b895ac77322ecae89bfc8c9f58d1f74b48d9260a3d3259ae95a8569fff51ea7e62c05d407dcfeffad45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f6b202474ea0daebadff88f97bb204
SHA123eb1f0bdc6bf31a99003f3d7b1b353f40a7218b
SHA2564322a06d6feb9e1a19a136d055271142b749fefdae1258dd56faeeabfa979f6f
SHA5123c9d07e71c0cf2d601dc40cd50d7398f645cea50955374ba77856d68c1948e76a87671d29ec0c865fce24be9d9f0e2528e34d0f7917b18e191077ba230d4c5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b47e61495459b8150bb4b2135586b6a5
SHA17c247dfcf2230e35d435d41e6d9d1e0f734fa32d
SHA2569352c608f63971f1b6ef2fcb3120ff72eeb2dd743d3c859ac3bdd9f36d9e7afa
SHA512506fd6da595836cc10fc66672b31cbcdb2b68a7254b19c9370bd0b6f9019ea08445134225dd53c20868013abeb6adc4bbd688e8e09f90dd6e4269d3ec3bbeab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5676f11fc9cae079e5e27879324fd2900
SHA19211e50d8b4ebabcba4a9ed85535d4d9fe17f74c
SHA256a5789e7af279864aa698ab5479199e9a39284f67764a1a22eea3aac3ed7ac1a2
SHA51228d69a7d690bf1194088469e818c65e1e5e973769b6812148b9ec7165bec15e61610766cbed4cd1f56d528c8518f17b89894e83ea7ed22614b44ace1c4bf2586
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a