Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
65bf031cc14d1c365b854c550b4d33b0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65bf031cc14d1c365b854c550b4d33b0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65bf031cc14d1c365b854c550b4d33b0_JaffaCakes118.html
-
Size
829B
-
MD5
65bf031cc14d1c365b854c550b4d33b0
-
SHA1
1fe77c6a6aba85aba7a90108990f07d6dbdf2163
-
SHA256
1b88a32ef95f546dc2f04d7d868446ef247bc60e2ae37ea15187d078ecb4eba7
-
SHA512
f5434675edf3424133998fd97bce225366fafc7c5ba9d63422f71da57f802c91479ced4b7e5689746e6c6e10af6b6b9680644daa7d9d07c176a7655feb018427
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F811811-17E5-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f7c290388e275f4ebb57befe2993ae9a000000000200000000001066000000010000200000004db4b4f1c3cbea51167634b53ed7f22529f9cd775864f142307762d91972868c000000000e8000000002000020000000339ed0fd0fa30006fdec1813a8399ce9f1553580bc8601fb8b6bd842ac977dd520000000c7118f1ad843b43e4e88fafb19b25f15ef563eacb70e2769587dc979ccb04f8d40000000c8e97fece06bb26b894d1eff8f4b590f638d0c8844dc365e876759e84c37bc1afe5f85b5119b4db6546aff1fd1f2f159766258fde44e2b416a24e20801e1228a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507914" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10de0974f2abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2012 iexplore.exe 2012 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2012 wrote to memory of 2936 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 2936 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 2936 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 2936 2012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65bf031cc14d1c365b854c550b4d33b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5568497da80b37ee496dee518e7b8c386
SHA17a23ef9efbcc6b45c3afa4fd822c8a865f69d4d9
SHA2568af73160ca5e888b46664043ca379c99564ba7d2760972bfc3ff5a176244bffa
SHA5122f9e13186f6aa4c5e1929b87124ae7fd4f37e55bb94ffb3da645468a8bf5b8b24a1451ef92a5ee9b515106584e6d0ace171ca0f9f2f1cc3fe35d704efe172658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca725047c485c411cd28fe708f7d375e
SHA165546c0f9a60b4e101688171813741013ff982ff
SHA256619f0b5f8c5eb730a91c2c0371c87ee2777d0ab4358ff142f424a1e6cde1b528
SHA51235e935e7342dffbbb7142596367d00839a090b6ac391e57b326010715ddb861b665bdb415b646c7d9aea889b5ed28e2d41cf2adc46281722ed4124c478af5e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d92f16d9c0196f7ac2824283e6fcded
SHA155a734f0a8e8bf8259f4d167c53aa42e44810ca8
SHA2564986e13e59e2412e02f95ae5be5f37cc82f80546eb7ba70a769c3056b147e8d9
SHA5121de54585390d74ec3431ef685bd38f3d8899aeba2024b19eecd020f6a4ebb1de8d34362d5e0ae30005f51195cb53e661aba807174a06ebc17c673a64f6129080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed8c51fd47bf5600492a0359f2368e8
SHA16ea268aeeacf700219016b5603172c50ab94745a
SHA2567cd057f2cc98709c8a6177157c9980f81df6f0bea3b8f607fa8670585c2c26a6
SHA5121113fd6c6b38707bfe85e557e18db22c5524cc6b24c951bd039db65c39ebe2c918562870dcbbb1f33bd3f563ff597405f47d6757700935f72bb83c05cafd011c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc59ec65082e2eea1142a3ccef3846f9
SHA13ac3b8eb24f610797399ecbe38e6afed0376d8de
SHA2564cc276978c4f0c44a19bc2eb2d7c75cd6b59b47c43b613f5115a5901caeafd06
SHA512739efd4941b17e88fc20e60011b344a574714a4a91c01a51cfc9872a0dc766a40d91a23600a715f93a25577cc39a3d08be518b4150efe7d854ad9ba264f6df1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d21b5a42266cea70665fd0a564d9fb7
SHA1fb55c76505c971e51276ba15c8b1dd20a7ce4af8
SHA2567b1c58ed86fc8102e2c6e6fa46840ff7595ce3e03302bc6c6e0af198a874f9bc
SHA512bcf4c84d8e835f516bb740f8f7d421022e4b02169ead0e7c75c6425bc0a13681428a0a0754fef06cd826d52e3657772abe47f7ef469c4e392ef591458eb7e9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae69513c808a7768d373a6d568e9814
SHA1032913ed50be55380065c4811bdcee74813ce725
SHA256fd20a3cc74f50027edaec14e81549de0485f97028ae4cb2e86045409e8097a2c
SHA512e9e23f5fca10a0d59985d41b13c45938d213694f9f7eaf358b481037b9ed469bb46cfb12e5e5eb8c9c1b329c6ea4642d9631dfccb2a2fc7579466a7816d45936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3cff3a1fffdefe289bdb9a6bd8a64b
SHA1e0fd4c7aa119e546e1e555d0e36d19c7031ece90
SHA256e479cca31bed90d5b4dd2f6752769f2eef5501e71adc8f5a43256c385eadb7d2
SHA512a75bc8e41a8c54c262bc50a75c06928dbe673772c30ce50b68fd9879ef4b521711876d918cd4aa822394d92786755b27e67dacdd58c1e009275f223a0056555e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514180aedac81e37f8325838d557d73be
SHA171f45d100cbed72f48faa1defd48a98b540e5765
SHA256179aabf89d4b3b96cf87c800cdaea26cabec451ce3a3c055e3d56871b46ac0aa
SHA512b1d61fefcdcf669306e0f035f3cd4cb010156ee2a6054d2e9e06f6e1cd6015a1889be349d102534d9e0d50a5f1988a3b54e93dac25a76bf944b263cc46eb3d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3d9b15a7e813a09ec5e237d49c77f8
SHA18667f3bd915ef395e0c9db20102e256baed26272
SHA256a6c92d5070e28ca7d97eec9d501fd74478b5f582d278f5040b031afc81f7ae06
SHA5127bc0fa1eddca4aa99711ed119260ea9cd9158d4d7151bcb4e7f439bdfaf56d2f8fd32e919ee4ace5eaa63cdefcc6a367c56957ec494799b1874c4dc47d2c7bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50927147e8c810b661329d4e53d6cdadb
SHA13eeeb1bd4d655b5ba01d8731086fafe777b91b1b
SHA25677c4f9db82c0c3b9fff584d124cc0b771dc9b8b0a16950fe3854fb40f01a39ad
SHA5120d600d4720ae002c17d47b53e193b5fa3ec7c5e524aaa35578fefefe06b3f9b469b4948636325210b87a2b165cd2af6a9b461618340ac65e155e1715aca8348a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da7deabbde130721a3d728fb86af38fc
SHA1ba35a8fd33663fa7ff02209bdc6c207f543c8436
SHA256ca8a5ab4ead10d3b2cbfa0b4b850be942f3c949200578947690b10c306456535
SHA5126722244c1057a42904d3949befc18774e714beed1cda6b0a52d5ab76284cbfc84837e8923f7f1dfe488abb98e7e7052affd8607be48827c048eda8b58df5d10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500ae13334ea0d91b54bf047c9f271693
SHA1925b3ede7d183eb0605baace2951d6e0453910d7
SHA256fba8dcee7d5d7570ccc8645fc355de580aff577bd34074f672cc1a366794e7d7
SHA5120df59c0767be37b07624ee24654ad382e2e0d8a49ec4a63aff9648b1ec3a26784af9d6bf20e71d5bdcdcb87d92dc548bc16fd198a4f10e57f4e5490d2887e797
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a