Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
65bc8951bc4810dfbaaecc6e46707f0a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65bc8951bc4810dfbaaecc6e46707f0a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65bc8951bc4810dfbaaecc6e46707f0a_JaffaCakes118.html
-
Size
15KB
-
MD5
65bc8951bc4810dfbaaecc6e46707f0a
-
SHA1
9f77746792a247632f5cf59af055343607de74ff
-
SHA256
17cafd68494a700c78011ccad66b085e44091939d1ea764ed94747b18e8e0725
-
SHA512
c2768f22b844736e5cad5aee4cf14ddf934f0c2b9c27245f32bcd097f6023effa69203492ec876d65bfc07502711c83eb2f3ecd79f2274d85a1a2b984b36dea6
-
SSDEEP
384:74C9ynGqmLgVzWXQUPdVXNevXiilzaaTM8FYQE4LZQZWN5tRZzJHt1V:74CEGqSg5WXxder9d+YUWftRZzJHt1V
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001102f1ade5d27a48a06155d97e05ce1d00000000020000000000106600000001000020000000e4fd8de11937309f3a2e1e41e60c62c2deff338f6881d18de790d57a053ac8e3000000000e8000000002000020000000b76ed73abe79ffe682778bb91715c482e6829c6147f891f7476a78df1246b91e20000000481ae8c1761fec9ca8c3bbdcfb51987952e6944988316496aa2ac37119c5a1f040000000ab4cdf589c0ffca6ec53d7f0b4b389e5aee4e875c444eaa2762b2c83cf13690939939773136949038fef326e33fdf54a08fbe1bedd5e8caa1bf753f53506d120 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507678" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F285DA1-17E5-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06836e4f1abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1056 iexplore.exe 1056 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1056 wrote to memory of 2684 1056 iexplore.exe IEXPLORE.EXE PID 1056 wrote to memory of 2684 1056 iexplore.exe IEXPLORE.EXE PID 1056 wrote to memory of 2684 1056 iexplore.exe IEXPLORE.EXE PID 1056 wrote to memory of 2684 1056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65bc8951bc4810dfbaaecc6e46707f0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5de03cf6a03bc9215fcf58c878872a10a
SHA1c0f00c02e29ca8d809e00ef600f388a4eb013e71
SHA25626785b496f01c810e353cc92d7ffb688b218e6a2cf0c3e831c05ff4193ba44f2
SHA5126b6efd6dcd6bef34867f2e406f0787183887235887ef80f36b0b30637a5c31dcfb9d297dc47c532ebe4a5418a08d611855fc8ad52f15ecda4cd850f14fc41b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54f851b8afefc68528a38c553ae043d13
SHA1da0a2e80034a127a91697e7bab09e10c3a981be2
SHA256140e60d58d2387af74eb3bbd4c7a6edce6d77e6581bfb3693af0149bc559e5ea
SHA512810a34e880c67b8453a7b383910e4e284cd98f22be6d730dfa944ff09167814017bc5c3447757fd7e82a66c8edd81a107af39dc440431bc4e8115e361336e487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e9308ace6c9623ea5662ae3dab19586d
SHA1db6b968c20ac9d5b6bfe87ab10c06ede609dd77f
SHA2561a212611795195549eed72f98635459ecc7ac98fa51400254d58783da998e696
SHA512adc95b6f742b05efb0bf25ef456c78b4c4e6b2d5cc487ea3e10c851afca402f503f590fa8a5318840c9c0deed07a0072f67b6630a89f7a6e9459ef00b31de6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cf9299ef74ac7b96e5c1d1a3f0dee08c
SHA114d1bf64a44bffee91f5ab494ebfb53312dc5e9f
SHA25603f9df4b1eb49413a3cc292bbb1bbc616301a6b8b790388aefddb46e5139bc4f
SHA512ed5821f8ad2ecae8a3de620065b36aa3866b3b5e12f381ef5a54fb88287eef2208e11fba957dd1e7ae7a8c411694236ecb91494954800fa3860311a3cbd080de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5340c8f4b5fda5f87d6ff036ea41218c2
SHA19a5988b53f02f276fbd8b6cccfd3acb00d95ce8d
SHA256846da87e7aa3419b8de9bdbd70665585480c92b9052dfd8f2d7e4657da2e047a
SHA5126558505f312b679a117b3b8e56bb501732309a17c7d05988653f2d7389857c31d45cef76f8bd42f1cc6c60db1e06631c47813ad04c9e48e170d79c0929eddb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57e1bd1758f52217184acb462975ae8c6
SHA19819ef7eaba5385ebbcae372213f2a8200cd7d80
SHA256c7562e6ebc814b2beae63f386a286d907e8218386ff276fee7e62a3e556af683
SHA512a61b96552095fe455f1e7f69590c614634d00cb7e939db4de40673ff7c304e309a2d67ff1ad1690f6076735a12d91c10d37800d4c4a0a4f326c18a2540afdd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bb11d8d1ab203c5959887f802a539ca9
SHA18da257df74d850740cd2c928a0892bc844866b78
SHA256007b74a380709d215368331b9bc89a78f450fc33f09e933706a057cb6b458db4
SHA512b639d8c593a5486afaf03d9e3c42be0a4604843a2e6319a56d6b592da8b8f271262d1d2971e3fea6586e0b094ffb2c42efd30ba33dbd40460418ff1e9495e858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e2cc8c61d43defc5b3b6587a15882a9b
SHA16375e1351cc106db3e0bc00473e52022a0488307
SHA2568263d6b34436c993aba098f7f64b31e5ef6d392335c2cc27446fe421ecc6b110
SHA5123cd3cd43077f628ec2debb88d23e1715569a226bb00dab65590162eaf6b30725e06edd2798a413f2727de7b64185c5fd49ee6f0f012967a2eec0e8a4a9a1b719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52f2318872359d3d91186996a7b2d501c
SHA153eab95b60ef1c9fa8fd3cf5d87f8a92aa122763
SHA256ad58afbe9c4dde5c2ba9862ceab3aee59198fed8dd5d1b890c954bbcb015d21b
SHA512df32f945a17b6f7ff5467618e6a1e5d69d8a9b010bf75e27ead6b28af4bf766fed94d0958730d5cfc42460153105906c65059d6c2feb034ff3247cfe6a0e9415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58dda06f69228e2bfd3c5f1074e7b0d2c
SHA1743eb4002e870acaa13f65c0c77a450ecb1a570b
SHA256d8b899f3c5b9ce02d9b7c2a874b643e5a1cba744b1f9801c36c3b72d1b388769
SHA512b7f7fa8b9df113851dc10feb451bdfe950bfe20b02ebe58a7a488a95da0969acab168c3103a0b5fc416052059034c3741345e7e3e20bfda2b54fc62330e1e1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54bcdb341774c589de98fe93a33c1f97e
SHA1cb25f624dd9e5f85a72e5233176c7437bdc84300
SHA256d655d32d2619440e2f37b8a387be8bb3bd7fb0769e9612f8ac7d3b9332e22c82
SHA5124b17ad9c90da5c13c57310ba41df1e60832e2950ea19f95160a212ddee7cdcbe2db33bf4f542aca909bfb8049aabececdd69fad85d15d6e8579ec0101108625e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56c3b41cee6cd045b5c67beeea92e17d9
SHA1498b5643219c5c7738522b56ab4ea466f00966f0
SHA2563e6070d8a04dd34f4d5193c7c7e695903cebf7735948265db5c79a8f0ccf30b2
SHA51272d6888de1463d7aff030ac1e518e3b7503b2a7abd841bc92834c0dc88de8389b266b1e2b7ce9d1a39ea6cfa781e4d59f6ab07b90e7c7a21c60930e20fa14ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d53aeedad66130f2f42de61fb4d13b1
SHA18f67b1d8222b9132f2f0c4d2855429abc82d2cd3
SHA2563625664cef0f06294e84582806f25c9993691ca696355dde1273e926b514c2ba
SHA512c7675281708658206c0ba3c7120b03bf6136e70689bbba3ed90ed60c77b11d81ee79b5395ea3cbc78dd5b3fdd35d3eb972b63b0ffa57d143c63cf4ca10361e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a858ca7df14ad9eb01852ea298e4fd34
SHA1de6cd6de759151af2c69b53b40792581a0974822
SHA256a9cdff03801f400f64ef9ae27f6d1652edc73aaef12c26884a24636aed3059fb
SHA512b68e35b6b00416fe1d1193db5a20b74330ea91eaa4689307b9d9c3e528292658406767f8e930da7bb417249d1ddb520bfac9a1cad7cc1574f729d1ce468e5f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54269fed1ee20f13a66d827a79dcd4c96
SHA11405373526a64b4eb5b30b4182e1e37dc11d4503
SHA256c9e63c6426a5fbc15aa009fc497647f8ef4a5c712f18348b1e375c00630be499
SHA5123250e6c15631f329512f2e31fa6237d3069a3cd03a467b9c7ad082c318741327f60d68994700a282c33140cbc317d69f7c22582df6baf88910e7bab453b1d239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51202e886216401d11ed49cc2aaf40369
SHA10b107bc8cf033c322321b53b7e06c4ffdaab7fcd
SHA2567624874c4eaead9d5299ace567c960043a8d0a424c4e0c1aa3f837a6cdd0db94
SHA51217eddfa63f4ef85b46fca6d98fb21dba8856e0dd95686c1e6b5781986a18316467403f9b220b0a897a76b5268af4df828e598f0d50c20d884e11830a926ecf23
-
C:\Users\Admin\AppData\Local\Temp\Cab8F55.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar90D5.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a