Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html
-
Size
139KB
-
MD5
65989d622bc1045219b9582fcb8e72e1
-
SHA1
3e2095247a249838d4aec5e6879ba018ade9a1c5
-
SHA256
8ce17e7d0312549ce1f5684fb5454532b6aecfc8c6a644a216c2a6b7908d8351
-
SHA512
2307f3e7374a7b2091107d3f6d4e6b34a8e229d1f1650d1b1dfa8281e11df10245cfdd5e5b0df22899d2077f0c1462f9c0d4cd0d710e73207cdd9c7301ad9604
-
SSDEEP
3072:NmvvAj1ddwmqPn4G+7rs55nItaCpRLW/clulhfOVYKcCP:NMAjbd1qPnU9
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504697" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{220DB931-17DE-11EF-8DB2-F2F7F00EEB0D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2424 iexplore.exe 2424 iexplore.exe 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2424 wrote to memory of 1400 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1400 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1400 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1400 2424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5cb35bd9d6c5a4fd50a9263018bbd9784
SHA1efec24f93d2af7bd01969c36870ebc928fa6c790
SHA256be648ee93df285417e494e28c01e3ab8f3d043845f4d3b397dfd137d187ed612
SHA512ac26182fb167458da4b465b118720470859e8028db8d3d71ddbe0c5be0e46b9178c5f7ccb8b1252c38754e27da1af546f8d2f6e32e1bfcbeac0d510aa831bf11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d50d98dce4da55ba7786c4f7b03176
SHA1709b126f98ad055e93728503c489639c305f4b01
SHA25691c672c8bbbfc1941d7c66b79d43c25c2ab3666e12beebb37b0fd1933314cc4a
SHA512f5b8497d30c516d4544e818be2fca535441882aebe7b9c93f65d4a5f4a80fa7ae8b26777e35cfa4d02634f1eccd8dff923e996aa2eb0740d7afdecfd7493cb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58548217d4d2a439225ae78be2d2911f9
SHA1f3a35df06ec459107c518be5c9298afd48a652ce
SHA25633d7e51b1e0d57ea9b9ed286037166d52838811f5875c6692e3cc5ba57e3cf34
SHA512d65651de9f1ab03cd261650b0c10f0e6e695ce1875f8fbc16d0432e3a8e04a840f83b87dcc5e572f4197b63272681b6e25547ee0beee5c685429e462629051fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55821e8e59375cb0649b4ac2bdab10f30
SHA1245e704de1c672af2a3ddbf1937e8ea8d65d4cd5
SHA256b9645ad7d060d68451af9f1a558b28f933e0c7a697bf2f5a492cfb04c41c0412
SHA512f3a60934ee560f46a83446478263aa2b5e3412a708165a39da77ad91b82ca1653dc9176ca296c93a142ef11c0752e8d842f847fff7964ba51384fbb7013c2b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b50e403d2c76a96103c6147921e71d7a
SHA1dd8b9d0c02dbb8b35be2dc2a719ca1de00089d6d
SHA2565be93bdc7eb82221c87f820c8855c6a88398cc5500c89c94176dc16c145563d6
SHA512ee5bdc9e80747683a149864799cb5dd3e2ef34a0d4b57c97824a7044d5a6012abe983c9f074195262d618b590d4b9ea855c7e5f4b12b15cd97058e8b978d4bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced3483cfbe9b2880d8b397ea390e7bc
SHA16f130f887cfee3d49fd0e811fd9a13d79040d51a
SHA25692c888e5fab090a17f0db38f324ceeb6a4a884309a0f79409d0d287895617f96
SHA512e3214949a8972787e3dd3b1ccffc3df55d2d15303e4b8cff41f6cf323f26fd911df77235820bd62dfd424614d901711a2b0bc2dac80511ea31fbbc5fdb7819ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525dba22eb1382136d01ce5d6621728f4
SHA11a65826721e5c46e68725efb0e63f94b44327dfc
SHA25621a7ba2a933cfbabb9eebea07d3c099a4bb0d8f09d2e6c7614f9bf5218013909
SHA512db09284817a6b066a8750c5b3194a5dbba0f83005e21365b96aedeacb4213ccedb5f954e89e8f159efe4668f29c2ad85a62e90337715e4c6b099f5f40af73c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539fbb7214df5c302a4b56ea3937cc52c
SHA1d44019aa770a7f799a6664e67988389af2dc4b81
SHA2560eecd36e336f03cb1729441b4064fcda66f86822e6f10065781771bb7ea38cb0
SHA5121702a4512405e8ebe0bd5b47723575223fb49eaba61714015cf904ee92e5215e0dfb67c9d6bf0eb873120137ef152c0e4eb7a38598fd8c6ae153ff61fbfa38a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543fb1ada0579a214a0992900ec211e5f
SHA173a3eaa7c8b179883fd4624ebde2ffaf8baec389
SHA25669bce40e1d17071410b90730f9f14ceccc9ccb88d363dd33f3fee34ca141d2f4
SHA512186d8b3c3e231325f509d513fd57342fa068793b8d1959652d3518f18349522077ac95812463f564a6e8658fb781470fa39b8b5e44d896886a7f6694196ec9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5bbff9ae55eece7ed5ca362b0d4ba9e
SHA1b6abc1429d85d68da0c0d165a570d9817fcbde47
SHA2564e405c9b08d6ab3f48e621b2054f992c84df43576147acf41a618d18b55e7fb8
SHA512a455dfe3685ffbab7039f2228ff86ef3fffe038c8a86e1f13cbc49383dfd9799f8d951fae6f36e7793154e4291d826daf8530b86454a90ae56ce58badc5c8350
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\52G8PVLC\css[1].css
Filesize2KB
MD5f7cc7386d154556f6c22cfceff0a808e
SHA14cb4fc6d9185dcb0e5992da81ac32f49d2147558
SHA256149e6c8d701ad64cba2ade35fd2533d7fd2c243d152800aa79fd0eed9dc65343
SHA512ce7420104a28ea8613b0eda27ff5a01ff40e72d88f7b3de4451598677e6f7e015a1f05ed8452bda0e19ae8dde64b11aad950565b56636398f05832fb62bb6350
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\font-awesome.min[1].css
Filesize30KB
MD5269550530cc127b6aa5a35925a7de6ce
SHA1512c7d79033e3028a9be61b540cf1a6870c896f8
SHA256799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
SHA51249f4e24e55fa924faa8ad7debe5ffb2e26d439e25696df6b6f20e7f766b50ea58ec3dbd61b6305a1acacd2c80e6e659accee4140f885b9c9e71008e9001fbf4b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\wcslog[1].js
Filesize27KB
MD5a96a3b75d4805a36138cf2d44de88ff8
SHA160b7451f964d9d7f4d27d0581dd7a54bc7d3aef8
SHA256df1a9b5c58e54a5ae635cd9316ac158183da9a29c53492436d1ff11d574a3e6a
SHA51274c4e438eb34a921556ab8e2260666caa5db76e20e7fbc22a02b955d4c872710544c687bc6e808d15885ed424453cfd4ed549fdcba692add076b75af042c6afe
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a